Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1545805
MD5:f75d194e93d6d5623177ef886053c197
SHA1:612a46e69761feb1a44add24ad6d760f3b6fa6cd
SHA256:86d0c493a79667fb6a9d7f24c0373924b582c8f2db797666df9324678af02f9b
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 6912 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F75D194E93D6D5623177EF886053C197)
    • taskkill.exe (PID: 6952 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6972 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6260 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6308 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 736 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 2056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2492 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 1104 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6572 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 3760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 6352 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7128 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7116 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 1104 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c47723c7-54b1-42e0-bf30-b0a4735b10ed} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26457170510 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7644 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1c0384d-dc4a-4d4b-84e5-6fa8035d9d07} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26466f2ed10 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8160 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 3932 -prefsLen 33074 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65bb0162-2239-4cbf-af1c-39acaa991dd2} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26468d8b710 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: file.exe PID: 6912JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: file.exeReversingLabs: Detection: 47%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: file.exeJoe Sandbox ML: detected
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49756 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49767 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49815 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49814 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49816 version: TLS 1.2
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1772754826.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000D.00000003.1852803108.0000026466BAC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1851596033.0000026466B9B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 0000000D.00000003.1852803108.0000026466BAC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1852322426.0000026466BA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1851596033.0000026466B9B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1851390114.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1772754826.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1852322426.0000026466BA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1851390114.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A8DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A968EE FindFirstFileW,FindClose,0_2_00A968EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A9698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A8D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A8D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A99642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A99642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A9979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A99B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A99B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A95C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A95C97
    Source: firefox.exeMemory has grown: Private usage: 42MB later: 225MB
    Source: unknownNetwork traffic detected: DNS query count 31
    Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
    Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
    Source: Joe Sandbox ViewIP Address: 151.101.193.91 151.101.193.91
    Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00A9CE44
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
    Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
    Source: firefox.exe, 0000000D.00000003.1900054559.00000264678E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923791967.00000264678E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1860224480.00000264730A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1860224480.000002647301C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1872854111.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1924561384.00000264675FE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896912180.00000264692F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1900054559.00000264678E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923791967.00000264678E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1860224480.00000264730A7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1860224480.000002647301C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1926370324.0000026467382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1872854111.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1924561384.00000264675FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
    Source: firefox.exe, 0000000D.00000003.1856923539.00000264731E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1900054559.00000264678E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1923791967.00000264678E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com- equals www.youtube.com (Youtube)
    Source: firefox.exe, 0000000D.00000003.1924561384.0000026467537000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889490241.00000264692E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1906544566.00000264692E4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
    Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: youtube.com
    Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
    Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
    Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: example.org
    Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
    Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
    Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
    Source: global trafficDNS traffic detected: DNS query: www.youtube.com
    Source: global trafficDNS traffic detected: DNS query: www.facebook.com
    Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
    Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
    Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
    Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
    Source: global trafficDNS traffic detected: DNS query: www.reddit.com
    Source: global trafficDNS traffic detected: DNS query: twitter.com
    Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
    Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
    Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
    Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
    Source: firefox.exe, 0000000D.00000003.1852465907.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849108415.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853369372.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849906901.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1851655217.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1852465907.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849108415.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853369372.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849906901.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1851655217.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
    Source: firefox.exe, 0000000D.00000003.1872215392.0000026469531000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1927901396.000002647300F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1920133366.000002646875A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860224480.000002647300F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
    Source: firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
    Source: firefox.exe, 0000000D.00000003.1916124485.000002646F291000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
    Source: firefox.exe, 0000000D.00000003.1885606823.000002646EEB0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
    Source: firefox.exe, 0000000D.00000003.1919575539.0000026468C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1874481134.0000026466EDF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916701015.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1761418834.000002646F3D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829289579.0000026468EEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815181610.00000264693F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE1C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926239404.00000264673EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821708837.000002646EF2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898829611.0000026468824000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853837002.0000026468F5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816420435.000002646A788000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845550340.0000026468F17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1718429909.0000026466ED7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842502081.00000264693F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1718429909.0000026466EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912038615.00000264695C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917119283.000002646EE1D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885606823.000002646EEEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1872215392.00000264695C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1720620904.0000026466C91000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818571274.000002646F3D7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
    Source: firefox.exe, 0000000D.00000003.1852465907.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849108415.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853369372.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849906901.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1851655217.0000026466B95000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
    Source: firefox.exe, 0000000D.00000003.1869270749.000002647153F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
    Source: firefox.exe, 0000000D.00000003.1899582396.0000026467FCF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867023666.0000026472EBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1899834178.0000026467F8E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878476153.0000026472EBE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
    Source: firefox.exe, 0000000D.00000003.1899834178.0000026467F8E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926370324.0000026467382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul8
    Source: firefox.exe, 0000000D.00000003.1899834178.0000026467F8E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulgjdd
    Source: firefox.exe, 00000010.00000002.2935665653.000001947E2FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1748307882.000001947E2FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1747050630.000001947E2FD000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468764000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
    Source: firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
    Source: firefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472852000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
    Source: firefox.exe, 0000000D.00000003.1888152609.000002646A65D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862852925.00000264728FB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880063882.00000264728FB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
    Source: firefox.exe, 0000000D.00000003.1904859876.000002646F086000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
    Source: firefox.exe, 0000000D.00000003.1836644553.00000264685AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838065684.0000026468177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835713100.0000026468177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1909821206.0000026473023000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831138927.00000264685A2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831424783.00000264681B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860224480.000002647301C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829723082.0000026468177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829723082.00000264681B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/enhancer-for-youtube/
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/facebook-container/
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/to-google-translate/
    Source: firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/firefox/addon/wikipedia-context-menu-search/
    Source: firefox.exe, 0000000D.00000003.1890657512.0000026472B8D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868134616.0000026472B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
    Source: firefox.exe, 0000000D.00000003.1924561384.0000026467537000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1924561384.00000264675D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
    Source: firefox.exe, 0000000D.00000003.1924149444.0000026467889000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1885606823.000002646EEB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
    Source: firefox.exe, 0000000D.00000003.1917119283.000002646EE27000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE27000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890769517.00000264728D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880882792.00000264728D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862852925.00000264728D0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913339794.0000026468D75000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
    Source: firefox.exe, 0000000D.00000003.1890657512.0000026472B7B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
    Source: firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
    Source: firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
    Source: firefox.exe, 0000000D.00000003.1764714164.0000026468162000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766325877.000002646814E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
    Source: firefox.exe, 0000000D.00000003.1764714164.0000026468162000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766325877.000002646814E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
    Source: firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
    Source: firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
    Source: firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
    Source: firefox.exe, 0000000D.00000003.1764714164.0000026468162000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1764714164.000002646815C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766325877.000002646814E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
    Source: firefox.exe, 0000000D.00000003.1764714164.0000026468162000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766325877.000002646814E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
    Source: firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1885396114.000002646F029000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
    Source: firefox.exe, 0000000D.00000003.1834492958.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838237834.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878320982.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867023666.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1806227707.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1771504207.0000026469441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1916701015.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE7A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored
    Source: firefox.exe, 0000000D.00000003.1845550340.0000026468F17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Mozilla/Tech/XPCOM/Reference/Interface/nsIEffectiveTLDServi
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
    Source: firefox.exe, 0000000D.00000003.1913175027.0000026469005000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898307958.0000026469005000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848856827.000002646914C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843518214.0000026469146000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1750886925.0000026468B32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752223557.0000026468B26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751990705.0000026470FD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
    Source: firefox.exe, 0000000D.00000003.1914764335.0000026472B08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1928341328.0000026472D54000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1867023666.0000026472EC9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
    Source: firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D52F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824712997.000002646EF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824712997.000002646EF26000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
    Source: firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
    Source: firefox.exe, 0000000D.00000003.1862372190.0000026472DA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1914231186.0000026472DA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892758772.000002646A99A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
    Source: firefox.exe, 0000000D.00000003.1869883297.000002646A1E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834492958.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838237834.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1921468584.0000026468697000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1852439785.000002646949D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1806227707.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1768654129.00000264694BD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
    Source: firefox.exe, 0000000D.00000003.1897787252.000002646905E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
    Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
    Source: firefox.exe, 0000000D.00000003.1869883297.000002646A1E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893358619.000002646A1E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
    Source: firefox.exe, 00000011.00000002.2931999965.000001DEE0EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
    Source: firefox.exe, 0000000D.00000003.1920133366.0000026468753000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/8ee55fa5-cb69-43d3-b4b0-1b69b
    Source: firefox.exe, 0000000D.00000003.1862852925.00000264728D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/messaging-system/1/a5d6ec76-765c-4778-
    Source: firefox.exe, 0000000D.00000003.1862607489.0000026472CBB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893358619.000002646A1E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/81cae964-b0f7-49d3-a82f-29f1
    Source: firefox.exe, 0000000D.00000003.1921814684.0000026468651000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/d905b368-ba4c-46c5
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
    Source: firefox.exe, 0000000D.00000003.1916061556.000002646F293000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750485832.0000026467966000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863700782.000002646F290000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
    Source: firefox.exe, 0000000D.00000003.1750485832.0000026467966000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schemaresource://gre/modules/Console.sys.mjs0ee067b7-c0ca-4cf6
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
    Source: firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1926370324.0000026467396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
    Source: firefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
    Source: firefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866671253.000002646A210000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
    Source: firefox.exe, 0000000D.00000003.1834492958.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838237834.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878320982.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878171295.000002647302B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860224480.000002647302B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867023666.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1806227707.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1771504207.0000026469441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
    Source: firefox.exe, 00000011.00000002.2931999965.000001DEE0E8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
    Source: firefox.exe, 0000000D.00000003.1776065797.0000026466B9F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
    Source: firefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
    Source: firefox.exe, 0000000D.00000003.1904626873.0000026472465000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1890984606.0000026472465000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1898562666.0000026468D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
    Source: firefox.exe, 0000000D.00000003.1892758772.000002646A99A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
    Source: firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
    Source: firefox.exe, 0000000D.00000003.1873527699.00000264690BB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1895013948.00000264690C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
    Source: firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
    Source: firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
    Source: firefox.exe, 0000000D.00000003.1845550340.0000026468F17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
    Source: firefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
    Source: firefox.exe, 0000000D.00000003.1872854111.00000264692A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896912180.0000026469283000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908935270.00000264692A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
    Source: firefox.exe, 0000000D.00000003.1893297547.000002646A1EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896806280.000002646A120000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905729883.000002646A120000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
    Source: firefox.exe, 0000000D.00000003.1910453019.000002646F222000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892758772.000002646A99A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D586000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
    Source: firefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
    Source: firefox.exe, 0000000D.00000003.1924561384.0000026467537000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1924561384.00000264675D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A9ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917600568.000002646A9ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892758772.000002646A9ED000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F2CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915310207.000002646F2CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
    Source: firefox.exe, 0000000D.00000003.1869883297.000002646A1E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926370324.0000026467382000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1893358619.000002646A1E2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
    Source: firefox.exe, 0000000D.00000003.1872215392.0000026469531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
    Source: firefox.exe, 0000000D.00000003.1858110558.00000264731B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
    Source: firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
    Source: firefox.exe, 0000000D.00000003.1872854111.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896912180.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889490241.00000264692F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
    Source: firefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892758772.000002646A99A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
    Source: firefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
    Source: firefox.exe, 0000000D.00000003.1858110558.00000264731B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
    Source: firefox.exe, 0000000D.00000003.1897474440.0000026469085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848856827.000002646914C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843518214.0000026469146000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
    Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
    Source: firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891609152.000002646EEDA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
    Source: firefox.exe, 0000000D.00000003.1748506041.000002646F13E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
    Source: firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
    Source: firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912948215.0000026469025000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848856827.000002646914C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843518214.0000026469146000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898099691.0000026469025000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
    Source: firefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mobilesuica.com/
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F2B2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863700782.000002646F2BA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863700782.000002646F2AB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915310207.000002646F2AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
    Source: firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
    Source: firefox.exe, 0000000D.00000003.1750886925.0000026468B32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752223557.0000026468B26000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751990705.0000026470FD7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
    Source: firefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/anything/?
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F2CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915310207.000002646F2CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F290000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1920133366.00000264687C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
    Source: firefox.exe, 0000000D.00000003.1863700782.000002646F2CA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1915310207.000002646F2CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
    Source: firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
    Source: firefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
    Source: firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
    Source: firefox.exe, 0000000D.00000003.1928288107.0000026472DEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
    Source: firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/9J
    Source: firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
    Source: firefox.exe, 0000000D.00000003.1884880655.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
    Source: firefox.exe, 00000011.00000002.2931999965.000001DEE0EF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/e
    Source: firefox.exe, 0000000D.00000003.1920133366.00000264687C0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881077066.0000026472873000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
    Source: firefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
    Source: firefox.exe, 0000000D.00000003.1924561384.0000026467548000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.openh264.org/
    Source: firefox.exe, 0000000D.00000003.1858110558.00000264731B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
    Source: firefox.exe, 0000000D.00000003.1872854111.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896912180.00000264692F6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1889490241.00000264692F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
    Source: firefox.exe, 0000000D.00000003.1845999656.0000026468E96000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1807846971.0000026468E94000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tsn.
    Source: firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
    Source: firefox.exe, 0000000D.00000003.1860224480.000002647301C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
    Source: firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
    Source: firefox.exe, 0000000D.00000003.1892758772.000002646A9ED000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1919575539.0000026468C98000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885131397.000002646F05C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
    Source: firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
    Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
    Source: firefox.exe, 00000011.00000002.2930504184.000001DEE0B30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
    Source: firefox.exe, 0000000D.00000003.1920133366.000002646877E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2931118282.00000206B1ADA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2931118282.00000206B1AD0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2933741435.00000206B1E64000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2929335802.000001947D30A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2930451406.000001947D3E4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2929335802.000001947D300000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2929503141.000001DEE0A8A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2930504184.000001DEE0B34000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2929503141.000001DEE0A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
    Source: firefox.exe, 00000011.00000002.2929503141.000001DEE0A8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd(W
    Source: firefox.exe, 0000000B.00000002.1700669011.000001DCC754A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1706254823.0000014C231F7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
    Source: firefox.exe, 0000000F.00000002.2931118282.00000206B1AD0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2933741435.00000206B1E64000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2930451406.000001947D3E4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2929335802.000001947D300000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2930504184.000001DEE0B34000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2929503141.000001DEE0A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
    Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49983
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
    Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49816
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49815
    Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49814
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
    Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
    Source: unknownNetwork traffic detected: HTTP traffic on port 49816 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
    Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
    Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
    Source: unknownNetwork traffic detected: HTTP traffic on port 49815 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
    Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
    Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
    Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
    Source: unknownNetwork traffic detected: HTTP traffic on port 49814 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49983 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
    Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
    Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49756 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49767 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49766 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49775 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49776 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49783 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49815 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49814 version: TLS 1.2
    Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49816 version: TLS 1.2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A9EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00A9ED6A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00A9EAFF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00A8AA57
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00AB9576

    System Summary

    barindex
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
    Source: file.exe, 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f4d3532d-2
    Source: file.exe, 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dd2926f6-e
    Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_50517e9b-4
    Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3ee244ec-0
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAD6337 NtQuerySystemInformation,16_2_000001947DAD6337
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAFA9B2 NtQuerySystemInformation,16_2_000001947DAFA9B2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00A8D5EB
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A81201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A81201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00A8E8F6
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A280600_2_00A28060
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A920460_2_00A92046
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A882980_2_00A88298
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A5E4FF0_2_00A5E4FF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A5676B0_2_00A5676B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB48730_2_00AB4873
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4CAA00_2_00A4CAA0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A2CAF00_2_00A2CAF0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3CC390_2_00A3CC39
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A56DD90_2_00A56DD9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A291C00_2_00A291C0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3B1190_2_00A3B119
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A413940_2_00A41394
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A417060_2_00A41706
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4781B0_2_00A4781B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A419B00_2_00A419B0
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A279200_2_00A27920
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3997D0_2_00A3997D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A47A4A0_2_00A47A4A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A47CA70_2_00A47CA7
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A41C770_2_00A41C77
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A59EEE0_2_00A59EEE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AABE440_2_00AABE44
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A41F320_2_00A41F32
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAD633716_2_000001947DAD6337
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAFA9B216_2_000001947DAFA9B2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAFB0DC16_2_000001947DAFB0DC
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAFA9F216_2_000001947DAFA9F2
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A40A30 appears 46 times
    Source: C:\Users\user\Desktop\file.exeCode function: String function: 00A3F9F2 appears 31 times
    Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@34/34@68/12
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A937B5 GetLastError,FormatMessageW,0_2_00A937B5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A810BF AdjustTokenPrivileges,CloseHandle,0_2_00A810BF
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00A816C3
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A951CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00A951CD
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00A8D4DC
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00A9648E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A242A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00A242A2
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6972:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3760:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2056:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6308:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1104:120:WilError_03
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
    Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
    Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: file.exeReversingLabs: Detection: 47%
    Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
    Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
    Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c47723c7-54b1-42e0-bf30-b0a4735b10ed} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26457170510 socket
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1c0384d-dc4a-4d4b-84e5-6fa8035d9d07} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26466f2ed10 rdd
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 3932 -prefsLen 33074 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65bb0162-2239-4cbf-af1c-39acaa991dd2} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26468d8b710 utility
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c47723c7-54b1-42e0-bf30-b0a4735b10ed} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26457170510 socketJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1c0384d-dc4a-4d4b-84e5-6fa8035d9d07} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26466f2ed10 rddJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 3932 -prefsLen 33074 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65bb0162-2239-4cbf-af1c-39acaa991dd2} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26468d8b710 utilityJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
    Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1772754826.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: wshbth.pdbGCTL source: firefox.exe, 0000000D.00000003.1852803108.0000026466BAC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1851596033.0000026466B9B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: wshbth.pdb source: firefox.exe, 0000000D.00000003.1852803108.0000026466BAC000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1852322426.0000026466BA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1851596033.0000026466B9B000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1851390114.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
    Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1772754826.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: pnrpnsp.pdbUGP source: firefox.exe, 0000000D.00000003.1852322426.0000026466BA6000.00000004.00000020.00020000.00000000.sdmp
    Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1851390114.00000264732E3000.00000004.00000020.00020000.00000000.sdmp
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
    Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A242DE
    Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A40A76 push ecx; ret 0_2_00A40A89
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
    Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A3F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00A3F98E
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AB1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00AB1C41
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95853
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAD6337 rdtsc 16_2_000001947DAD6337
    Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00A8DBBE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A968EE FindFirstFileW,FindClose,0_2_00A968EE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00A9698F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A8D076
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00A8D3A9
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A99642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A99642
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00A9979D
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A99B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00A99B2B
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A95C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00A95C97
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A242DE
    Source: firefox.exe, 00000010.00000002.2929335802.000001947D30A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPh
    Source: firefox.exe, 00000010.00000002.2934936394.000001947DB50000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934620243.000001DEE0F00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: firefox.exe, 0000000F.00000002.2934097348.00000206B1F21000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
    Source: firefox.exe, 0000000F.00000002.2931118282.00000206B1ADA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW)
    Source: firefox.exe, 00000010.00000002.2934936394.000001947DB50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll_x
    Source: firefox.exe, 0000000F.00000002.2931118282.00000206B1ADA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW m
    Source: firefox.exe, 0000000F.00000002.2934934525.00000206B2340000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll}
    Source: firefox.exe, 00000010.00000002.2934936394.000001947DB50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'C
    Source: firefox.exe, 0000000F.00000002.2934934525.00000206B2340000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: firefox.exe, 00000011.00000002.2929503141.000001DEE0A8A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@E
    Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
    Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_000001947DAD6337 rdtsc 16_2_000001947DAD6337
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A9EAA2 BlockInput,0_2_00A9EAA2
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A52622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A52622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A242DE
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A44CE8 mov eax, dword ptr fs:[00000030h]0_2_00A44CE8
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A80B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A80B62
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A52622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A52622
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A4083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00A4083F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A409D5 SetUnhandledExceptionFilter,0_2_00A409D5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A40C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00A40C21
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A81201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00A81201
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A62BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00A62BA5
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A8B226 SendInput,keybd_event,0_2_00A8B226
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00AA22DA
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A80B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00A80B62
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A81663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00A81663
    Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
    Source: file.exeBinary or memory string: Shell_TrayWnd
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A40698 cpuid 0_2_00A40698
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A98195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00A98195
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A7D27A GetUserNameW,0_2_00A7D27A
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A5BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00A5BB6F
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00A242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00A242DE

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6912, type: MEMORYSTR
    Source: file.exeBinary or memory string: WIN_81
    Source: file.exeBinary or memory string: WIN_XP
    Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
    Source: file.exeBinary or memory string: WIN_XPe
    Source: file.exeBinary or memory string: WIN_VISTA
    Source: file.exeBinary or memory string: WIN_7
    Source: file.exeBinary or memory string: WIN_8

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: file.exe PID: 6912, type: MEMORYSTR
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00AA1204
    Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AA1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00AA1806
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure2
    Valid Accounts
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    Exploitation for Privilege Escalation
    2
    Disable or Modify Tools
    21
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts1
    Native API
    2
    Valid Accounts
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    LSASS Memory1
    Account Discovery
    Remote Desktop Protocol21
    Input Capture
    12
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    Extra Window Memory Injection
    2
    Obfuscated Files or Information
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares3
    Clipboard Data
    2
    Non-Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
    Valid Accounts
    1
    DLL Side-Loading
    NTDS16
    System Information Discovery
    Distributed Component Object ModelInput Capture3
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
    Access Token Manipulation
    1
    Extra Window Memory Injection
    LSA Secrets131
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
    Process Injection
    1
    Masquerading
    Cached Domain Credentials1
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
    Valid Accounts
    DCSync3
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    Virtualization/Sandbox Evasion
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
    Access Token Manipulation
    /etc/passwd and /etc/shadow1
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
    Process Injection
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1545805 Sample: file.exe Startdate: 31/10/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 226 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 172.217.18.14, 443, 49739, 49740 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49741, 49746, 49752 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
    file.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
    C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
    No Antivirus matches
    SourceDetectionScannerLabelLink
    example.org0%VirustotalBrowse
    star-mini.c10r.facebook.com0%VirustotalBrowse
    prod.classify-client.prod.webservices.mozgcp.net0%VirustotalBrowse
    prod.balrog.prod.cloudops.mozgcp.net0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
    https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
    http://www.mozilla.com00%URL Reputationsafe
    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
    https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
    https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema.0%URL Reputationsafe
    https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
    https://www.leboncoin.fr/0%URL Reputationsafe
    https://spocs.getpocket.com/spocs0%URL Reputationsafe
    https://shavar.services.mozilla.com0%URL Reputationsafe
    https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
    https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
    https://monitor.firefox.com/breach-details/0%URL Reputationsafe
    https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
    https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
    https://content-signature-2.cdn.mozilla.net/0%URL Reputationsafe
    https://json-schema.org/draft/2020-12/schema/=0%URL Reputationsafe
    https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
    https://api.accounts.firefox.com/v10%URL Reputationsafe
    https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12836010%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
    https://MD8.mozilla.org/1/m0%URL Reputationsafe
    https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
    https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-1520%URL Reputationsafe
    https://bugzilla.mo0%URL Reputationsafe
    https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
    https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
    https://shavar.services.mozilla.com/0%URL Reputationsafe
    https://spocs.getpocket.com/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
    https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
    https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
    https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
    http://a9.com/-/spec/opensearch/1.0/0%URL Reputationsafe
    https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
    https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
    https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
    https://monitor.firefox.com/about0%URL Reputationsafe
    https://account.bellmedia.c0%URL Reputationsafe
    https://www.openh264.org/0%URL Reputationsafe
    https://login.microsoftonline.com0%URL Reputationsafe
    https://coverage.mozilla.org0%URL Reputationsafe
    http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
    https://www.zhihu.com/0%URL Reputationsafe
    http://a9.com/-/spec/opensearch/1.1/0%URL Reputationsafe
    https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
    https://blocked.cdn.mozilla.net/0%URL Reputationsafe
    https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnored0%URL Reputationsafe
    https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
    https://profiler.firefox.com0%URL Reputationsafe
    https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
    https://identity.mozilla.com/apps/relay0%URL Reputationsafe
    https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
    https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
    https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
    https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
    https://contile.services.mozilla.com/v1/tiles0%URL Reputationsafe
    https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/0%URL Reputationsafe
    https://monitor.firefox.com/user/preferences0%URL Reputationsafe
    https://screenshots.firefox.com/0%URL Reputationsafe
    http://json-schema.org/draft-07/schema#-0%URL Reputationsafe
    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report0%URL Reputationsafe
    https://www.wykop.pl/0%URL Reputationsafe
    https://www.olx.pl/0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    example.org
    93.184.215.14
    truefalseunknown
    star-mini.c10r.facebook.com
    157.240.0.35
    truefalseunknown
    prod.classify-client.prod.webservices.mozgcp.net
    35.190.72.216
    truefalseunknown
    prod.balrog.prod.cloudops.mozgcp.net
    35.244.181.201
    truefalseunknown
    twitter.com
    104.244.42.129
    truefalse
      unknown
      prod.detectportal.prod.cloudops.mozgcp.net
      34.107.221.82
      truefalse
        unknown
        services.addons.mozilla.org
        151.101.193.91
        truefalse
          unknown
          dyna.wikimedia.org
          185.15.59.224
          truefalse
            unknown
            prod.remote-settings.prod.webservices.mozgcp.net
            34.149.100.209
            truefalse
              unknown
              contile.services.mozilla.com
              34.117.188.166
              truefalse
                unknown
                youtube.com
                172.217.18.14
                truefalse
                  unknown
                  prod.content-signature-chains.prod.webservices.mozgcp.net
                  34.160.144.191
                  truefalse
                    unknown
                    youtube-ui.l.google.com
                    142.250.185.238
                    truefalse
                      unknown
                      us-west1.prod.sumo.prod.webservices.mozgcp.net
                      34.149.128.2
                      truefalse
                        unknown
                        reddit.map.fastly.net
                        151.101.193.140
                        truefalse
                          unknown
                          ipv4only.arpa
                          192.0.0.170
                          truefalse
                            unknown
                            prod.ads.prod.webservices.mozgcp.net
                            34.117.188.166
                            truefalse
                              unknown
                              push.services.mozilla.com
                              34.107.243.93
                              truefalse
                                unknown
                                normandy-cdn.services.mozilla.com
                                35.201.103.21
                                truefalse
                                  unknown
                                  telemetry-incoming.r53-2.services.mozilla.com
                                  34.120.208.123
                                  truefalse
                                    unknown
                                    www.reddit.com
                                    unknown
                                    unknownfalse
                                      unknown
                                      spocs.getpocket.com
                                      unknown
                                      unknownfalse
                                        unknown
                                        content-signature-2.cdn.mozilla.net
                                        unknown
                                        unknownfalse
                                          unknown
                                          support.mozilla.org
                                          unknown
                                          unknownfalse
                                            unknown
                                            firefox.settings.services.mozilla.com
                                            unknown
                                            unknownfalse
                                              unknown
                                              www.youtube.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                www.facebook.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  detectportal.firefox.com
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    normandy.cdn.mozilla.net
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      shavar.services.mozilla.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        www.wikipedia.org
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          NameSourceMaliciousAntivirus DetectionReputation
                                                          https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            unknown
                                                            https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 0000000D.00000003.1887867578.000002646A98F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://datastudio.google.com/embed/reporting/firefox.exe, 0000000D.00000003.1834492958.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838237834.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878320982.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867023666.0000026472EC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1806227707.000002646945C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1771504207.0000026469441000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000011.00000002.2931999965.000001DEE0E8F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.leboncoin.fr/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1872854111.00000264692A3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1896912180.0000026469283000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1908935270.00000264692A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1924561384.0000026467537000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1924561384.00000264675D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1897474440.0000026469085000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848856827.000002646914C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843518214.0000026469146000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://www.msn.comfirefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                unknown
                                                                https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://youtube.com/firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000D.00000003.1863700782.000002646F290000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                      unknown
                                                                      https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=htfirefox.exe, 0000000D.00000003.1863072198.00000264724C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.amazon.com/firefox.exe, 0000000D.00000003.1858110558.00000264731B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                            unknown
                                                                            https://www.youtube.com/firefox.exe, 0000000D.00000003.1860224480.000002647301C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D50A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://MD8.mozilla.org/1/mfirefox.exe, 0000000D.00000003.1920133366.0000026468764000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://json-schema.org/draft/2019-09/schemaresource://gre/modules/Console.sys.mjs0ee067b7-c0ca-4cf6firefox.exe, 0000000D.00000003.1750485832.0000026467966000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://www.bbc.co.uk/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://addons.mozilla.org/firefox/addon/to-google-translate/firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 0000000D.00000003.1904859876.000002646F0AF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0EC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    http://127.0.0.1:firefox.exe, 0000000D.00000003.1869796107.000002646ED9F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1764714164.0000026468162000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766325877.000002646814E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://searchfox.org/mozilla-central/source/toolkit/components/search/SearchUtils.jsm#145-152firefox.exe, 0000000D.00000003.1845550340.0000026468F17000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://bugzilla.mofirefox.exe, 0000000D.00000003.1890657512.0000026472B7B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000D.00000003.1913339794.0000026468D8F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898477754.0000026468D69000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                        unknown
                                                                                        https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1893297547.000002646A1EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://spocs.getpocket.com/firefox.exe, 00000010.00000002.2931474062.000001947D512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2931999965.000001DEE0E13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://www.iqiyi.com/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1874481134.0000026466EDF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1916701015.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1761418834.000002646F3D7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829289579.0000026468EEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815181610.00000264693F4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE1C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1926239404.00000264673EC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1821708837.000002646EF2C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898829611.0000026468824000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853837002.0000026468F5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1816420435.000002646A788000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845550340.0000026468F17000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1718429909.0000026466ED7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842502081.00000264693F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1718429909.0000026466EF0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912038615.00000264695C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917119283.000002646EE1D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1885606823.000002646EEEC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1872215392.00000264695C8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1720620904.0000026466C91000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818571274.000002646F3D7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://www.openh264.org/firefox.exe, 0000000D.00000003.1924561384.0000026467548000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1864387772.000002646A387000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866671253.000002646A210000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1888459009.000002646A387000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://www.zhihu.com/firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000D.00000003.1920133366.0000026468748000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1821708837.000002646EF48000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://developer.mozilla.org/en-US/docs/Glossary/speculative_parsingDocumentWriteIgnoredfirefox.exe, 0000000D.00000003.1916701015.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE7A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE7A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1916061556.000002646F293000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750485832.0000026467966000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863700782.000002646F290000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://profiler.firefox.comfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1897787252.000002646905E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1872215392.0000026469531000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1713804978.0000026466932000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712906930.0000026466933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1713508001.000002646692A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://addons.mozilla.org/firefox/addon/reddit-enhancement-suite/firefox.exe, 0000000D.00000003.1869026138.0000026472496000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1884768062.0000026472496000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.2931553133.00000206B1DC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2931474062.000001947D5E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2934792391.000001DEE1003000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1884880655.000002646F086000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  https://www.amazon.co.uk/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000D.00000003.1867023666.0000026472EC9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://www.google.com/searchfirefox.exe, 0000000D.00000003.1711418132.000002646477B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711203771.000002646475D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1912948215.0000026469025000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710858151.0000026464720000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1710698467.0000026466C00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1848856827.000002646914C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1711031666.000002646473E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843518214.0000026469146000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1898099691.0000026469025000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        http://json-schema.org/draft-07/schema#-firefox.exe, 0000000D.00000003.1919302679.0000026468CEA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.2930994200.00000206B1A30000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2934194182.000001947DA60000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2931266872.000001DEE0B60000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://www.wykop.pl/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          https://twitter.com/firefox.exe, 0000000D.00000003.1858110558.00000264731B3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://www.olx.pl/firefox.exe, 0000000D.00000003.1869489350.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1917119283.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1886979332.000002646EE4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891243367.000002646F278000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892117068.000002646EE4B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://bugzilla.mozilla.org/show_bug.cgi?id=1193802firefox.exe, 0000000D.00000003.1764714164.000002646816B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765996031.000002646816B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              • No. of IPs < 25%
                                                                                                              • 25% < No. of IPs < 50%
                                                                                                              • 50% < No. of IPs < 75%
                                                                                                              • 75% < No. of IPs
                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                              172.217.18.14
                                                                                                              youtube.comUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              34.149.100.209
                                                                                                              prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                              2686ATGS-MMD-ASUSfalse
                                                                                                              34.107.243.93
                                                                                                              push.services.mozilla.comUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              34.107.221.82
                                                                                                              prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              35.244.181.201
                                                                                                              prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              34.117.188.166
                                                                                                              contile.services.mozilla.comUnited States
                                                                                                              139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                              151.101.193.91
                                                                                                              services.addons.mozilla.orgUnited States
                                                                                                              54113FASTLYUSfalse
                                                                                                              35.201.103.21
                                                                                                              normandy-cdn.services.mozilla.comUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              35.190.72.216
                                                                                                              prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              34.160.144.191
                                                                                                              prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                              2686ATGS-MMD-ASUSfalse
                                                                                                              34.120.208.123
                                                                                                              telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                              15169GOOGLEUSfalse
                                                                                                              IP
                                                                                                              127.0.0.1
                                                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                                                              Analysis ID:1545805
                                                                                                              Start date and time:2024-10-31 02:58:04 +01:00
                                                                                                              Joe Sandbox product:CloudBasic
                                                                                                              Overall analysis duration:0h 6m 51s
                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                              Report type:full
                                                                                                              Cookbook file name:default.jbs
                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                              Number of analysed new started processes analysed:23
                                                                                                              Number of new started drivers analysed:0
                                                                                                              Number of existing processes analysed:0
                                                                                                              Number of existing drivers analysed:0
                                                                                                              Number of injected processes analysed:0
                                                                                                              Technologies:
                                                                                                              • HCA enabled
                                                                                                              • EGA enabled
                                                                                                              • AMSI enabled
                                                                                                              Analysis Mode:default
                                                                                                              Analysis stop reason:Timeout
                                                                                                              Sample name:file.exe
                                                                                                              Detection:MAL
                                                                                                              Classification:mal72.troj.evad.winEXE@34/34@68/12
                                                                                                              EGA Information:
                                                                                                              • Successful, ratio: 50%
                                                                                                              HCA Information:
                                                                                                              • Successful, ratio: 94%
                                                                                                              • Number of executed functions: 40
                                                                                                              • Number of non-executed functions: 309
                                                                                                              Cookbook Comments:
                                                                                                              • Found application associated with file extension: .exe
                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                              • Excluded IPs from analysis (whitelisted): 35.160.212.113, 52.11.191.138, 54.185.230.140, 142.250.185.238, 2.22.61.56, 2.22.61.59, 142.250.186.174, 172.217.18.10, 172.217.18.106
                                                                                                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                              • Report size getting too big, too many NtCreateFile calls found.
                                                                                                              • Report size getting too big, too many NtOpenFile calls found.
                                                                                                              TimeTypeDescription
                                                                                                              21:59:05API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              34.117.188.166file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                  151.101.193.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                      34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                          example.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 93.184.215.14
                                                                                                                                                                          star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.253.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.0.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.253.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.252.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.252.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.251.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.253.35
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 157.240.252.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.253.35
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 157.240.251.35
                                                                                                                                                                          twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.1
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.65
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 104.244.42.129
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 104.244.42.193
                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                          GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.117.188.166
                                                                                                                                                                          FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          Arquivo_4593167.msiGet hashmaliciousAteraAgentBrowse
                                                                                                                                                                          • 199.232.210.172
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.65.91
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.129.91
                                                                                                                                                                          V6QED2Q1WBYVOPEGet hashmaliciousUnknownBrowse
                                                                                                                                                                          • 151.101.67.6
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.1.91
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          ATGS-MMD-ASUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                          fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          • 151.101.193.91
                                                                                                                                                                          • 35.244.181.201
                                                                                                                                                                          • 34.149.100.209
                                                                                                                                                                          • 34.160.144.191
                                                                                                                                                                          • 34.120.208.123
                                                                                                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                          C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                              C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):7813
                                                                                                                                                                                                                  Entropy (8bit):5.177972564333871
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:ujMXRNGcbhbVbTbfbRbObtbyEl7ncrk3JA6WnSrDtTUd/SkDrqp:uYKcNhnzFSJ8rkeBnSrDhUd/a
                                                                                                                                                                                                                  MD5:695C7FD9F0F56B9E01CC1FD5BF476D92
                                                                                                                                                                                                                  SHA1:831F5805FCBA66CD898EEA6C8A65F5F12657750E
                                                                                                                                                                                                                  SHA-256:9709FF2BDA3C5C4A9C6CCBB300E9A97AC44557DD0623E3DCE0E61EDFF3E905B8
                                                                                                                                                                                                                  SHA-512:1BB06D6493729293A21EEFB358D0A9F0E7EE2470ED33301973BFA97B4F0D1FFA77C5EB8BC22867EF13C8C8C570A732138A047703971653C633B861A5AA7B7801
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"type":"uninstall","id":"dc6bb18d-ca5e-413c-9f50-498f30b5ab67","creationDate":"2024-10-31T03:07:19.341Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):7813
                                                                                                                                                                                                                  Entropy (8bit):5.177972564333871
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:ujMXRNGcbhbVbTbfbRbObtbyEl7ncrk3JA6WnSrDtTUd/SkDrqp:uYKcNhnzFSJ8rkeBnSrDhUd/a
                                                                                                                                                                                                                  MD5:695C7FD9F0F56B9E01CC1FD5BF476D92
                                                                                                                                                                                                                  SHA1:831F5805FCBA66CD898EEA6C8A65F5F12657750E
                                                                                                                                                                                                                  SHA-256:9709FF2BDA3C5C4A9C6CCBB300E9A97AC44557DD0623E3DCE0E61EDFF3E905B8
                                                                                                                                                                                                                  SHA-512:1BB06D6493729293A21EEFB358D0A9F0E7EE2470ED33301973BFA97B4F0D1FFA77C5EB8BC22867EF13C8C8C570A732138A047703971653C633B861A5AA7B7801
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"type":"uninstall","id":"dc6bb18d-ca5e-413c-9f50-498f30b5ab67","creationDate":"2024-10-31T03:07:19.341Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                  Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                  MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                  SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                  SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                  SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):453023
                                                                                                                                                                                                                  Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                  Encrypted:true
                                                                                                                                                                                                                  SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                  MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                  SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                  SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                  SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):3621
                                                                                                                                                                                                                  Entropy (8bit):4.926624235351291
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNL1BQ8P:8S+OBIUjOdwiOdYVjjwL1BQ8P
                                                                                                                                                                                                                  MD5:342FE949B69F09B2F271FF1ECD760DBA
                                                                                                                                                                                                                  SHA1:568F9EAFF6C915419C2490F01BD586E9D5D26458
                                                                                                                                                                                                                  SHA-256:AABE0B41156B128676F8DB9618CBA492404F386D9323562DCC27DA64AFC70EBE
                                                                                                                                                                                                                  SHA-512:61181E0B9C86B93C5E9C43347CDEE9F7224080F188C6F71BB34A08049BAC344C2E7A51D50DF6E8B6D9B880B85C8052F9866F16BA5A6021235D28DC90190BFDC3
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):3621
                                                                                                                                                                                                                  Entropy (8bit):4.926624235351291
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNL1BQ8P:8S+OBIUjOdwiOdYVjjwL1BQ8P
                                                                                                                                                                                                                  MD5:342FE949B69F09B2F271FF1ECD760DBA
                                                                                                                                                                                                                  SHA1:568F9EAFF6C915419C2490F01BD586E9D5D26458
                                                                                                                                                                                                                  SHA-256:AABE0B41156B128676F8DB9618CBA492404F386D9323562DCC27DA64AFC70EBE
                                                                                                                                                                                                                  SHA-512:61181E0B9C86B93C5E9C43347CDEE9F7224080F188C6F71BB34A08049BAC344C2E7A51D50DF6E8B6D9B880B85C8052F9866F16BA5A6021235D28DC90190BFDC3
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):5312
                                                                                                                                                                                                                  Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                  MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                  SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                  SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                  SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):5312
                                                                                                                                                                                                                  Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                  MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                  SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                  SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                  SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):24
                                                                                                                                                                                                                  Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                  MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                  SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                  SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                  SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):24
                                                                                                                                                                                                                  Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                  MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                  SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                  SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                  SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):262144
                                                                                                                                                                                                                  Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                  MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                  SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                  SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                  SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):66
                                                                                                                                                                                                                  Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                  MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                  SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                  SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                  SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):66
                                                                                                                                                                                                                  Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                  MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                  SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                  SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                  SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):36830
                                                                                                                                                                                                                  Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                  MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                  SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                  SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                  SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):36830
                                                                                                                                                                                                                  Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                  MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                  SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                  SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                  SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                  Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                  MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                  SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                  SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                  SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1021904
                                                                                                                                                                                                                  Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                  MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                  SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                  SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                  SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                  Joe Sandbox View:
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1021904
                                                                                                                                                                                                                  Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                  MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                  SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                  SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                  SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Antivirus:
                                                                                                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                  Joe Sandbox View:
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:ASCII text
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):116
                                                                                                                                                                                                                  Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                  MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                  SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                  SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                  SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:ASCII text
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):116
                                                                                                                                                                                                                  Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                  MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                  SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                  SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                  SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):98304
                                                                                                                                                                                                                  Entropy (8bit):0.07326129440586931
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zki3:DLhesh7Owd4+ji
                                                                                                                                                                                                                  MD5:50CE4EA415641CDF185A383CA41CA7BF
                                                                                                                                                                                                                  SHA1:0B80E1F067991ADDC80DEFB4EC54CF29DA4A7F1B
                                                                                                                                                                                                                  SHA-256:BBB5296D3FB466AF9A7DBC0A6A4842A1B599C79491D1425E89BC76219A7F1628
                                                                                                                                                                                                                  SHA-512:6FCCA3EEA8B045DBD6D2C6DF4EBA08AF9D01506F1DA8C537877C4E9F437CE149FD212E52042C4102CD257E992D171D6A1FDF2E65AF59764D65062274861AD8A3
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):32768
                                                                                                                                                                                                                  Entropy (8bit):0.035699946889726504
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:GtlstFm1LiEF9609HYlstFm1LiEF960ll//T89//alEl:GtWtk1WEFY09HYWtk1WEFY0llD89XuM
                                                                                                                                                                                                                  MD5:2FFF54A2F943B3782F601D7CDEB98BD7
                                                                                                                                                                                                                  SHA1:FB030544F3FC3CD95B031A0C684D859927D45D31
                                                                                                                                                                                                                  SHA-256:0BD360CB27DB6C5B60AC0EBCCF5F9971A283984BF3C7592D9C13A27305612F73
                                                                                                                                                                                                                  SHA-512:1C7A9ADC8DCDB4AFD8CE520EBFAB3D4873B3D11939AF73A814BCA4AFD7E292BE556F767E4A2B79A3B732C8F7A7B5B0B74EB8EABD54947F714C897C0F9E3593B4
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:..-.....................q....8.Gi..5.y.s....Z....-.....................q....8.Gi..5.y.s....Z..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):32824
                                                                                                                                                                                                                  Entropy (8bit):0.04001911727921433
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:Ol18QbyllfM1cPTRdb37l8rEXsxdwhml8XW3R2:KShPtdbLl8dMhm93w
                                                                                                                                                                                                                  MD5:4E76815DEACDF71CBE29719213D11D9D
                                                                                                                                                                                                                  SHA1:2137F0DAC46B9C7862A5F7FD3DF9385280705057
                                                                                                                                                                                                                  SHA-256:78AF7C18E6A1C39460ECA45940F2F8FD633912E4B38EF8677EF36A697140868A
                                                                                                                                                                                                                  SHA-512:B7CBD276C3141F0E4ACF18493150688E114DC1245F15A1A6E082BE350BABD6581AAD65EE27D5D0141EDC26868883955AB27B067F4A84AAB7943588DA27DA17D9
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:7....-..........i..5.y....|Y...........i..5.y....qG.8.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):13254
                                                                                                                                                                                                                  Entropy (8bit):5.493490499489525
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:wnaRtLYbBp6+hj4qyaaXv6KteN1hz5RfGNBw8dkSl:Ne4q1iKDcwX0
                                                                                                                                                                                                                  MD5:C02556186B12C00BC2298C9FC26EB284
                                                                                                                                                                                                                  SHA1:7D068FF817B07F3E008BAFB14FF3FDF389B9DFBE
                                                                                                                                                                                                                  SHA-256:9DC6A38E094C01A404EA7C5DCA291CB222035BDF841328D9CB7EA945F5B197CE
                                                                                                                                                                                                                  SHA-512:65541EF87AA1E38CB9E423F4D1A221960F5780B423258BA0183F4F33CE9DEAAAB374DE126E613523823888826984CC3CC896B1B6A4B95ECEC040C18CCCDB7FCF
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730344009);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730344009);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730344009);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173034
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):13254
                                                                                                                                                                                                                  Entropy (8bit):5.493490499489525
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:192:wnaRtLYbBp6+hj4qyaaXv6KteN1hz5RfGNBw8dkSl:Ne4q1iKDcwX0
                                                                                                                                                                                                                  MD5:C02556186B12C00BC2298C9FC26EB284
                                                                                                                                                                                                                  SHA1:7D068FF817B07F3E008BAFB14FF3FDF389B9DFBE
                                                                                                                                                                                                                  SHA-256:9DC6A38E094C01A404EA7C5DCA291CB222035BDF841328D9CB7EA945F5B197CE
                                                                                                                                                                                                                  SHA-512:65541EF87AA1E38CB9E423F4D1A221960F5780B423258BA0183F4F33CE9DEAAAB374DE126E613523823888826984CC3CC896B1B6A4B95ECEC040C18CCCDB7FCF
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730344009);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730344009);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730344009);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173034
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):65536
                                                                                                                                                                                                                  Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                  MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                  SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                  SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                  SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):90
                                                                                                                                                                                                                  Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                  MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                  SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                  SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                  SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):90
                                                                                                                                                                                                                  Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                  MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                  SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                  SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                  SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1577
                                                                                                                                                                                                                  Entropy (8bit):6.3276486263012774
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSsBuLXnIgm/pnxQwRlszT5sKt0Bc3eHVQj6TpamhujJlOsIomNVr02:GUpOxuGnR6X3eHTp4JlIq4w4
                                                                                                                                                                                                                  MD5:9AEA65B96191ED56DF8CD2B187A700E8
                                                                                                                                                                                                                  SHA1:521B67413D050335D46C815E500D706575F4820D
                                                                                                                                                                                                                  SHA-256:49D6EF8B46195DCA523B917A67416437EC2E89B85EBD82185FDA2AEAC6C4621B
                                                                                                                                                                                                                  SHA-512:40F12BDE2275ECA337FD71BC78D2E0158E8689FD228579B5D6BE50D5F9C9FD6CC821977B6BF54A84FE842D11D0B963D644EF925FE2CB2A7F7E7CF5C39A564C9E
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5ebbc55e-bdce-408b-93e2-87251f0cada2}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730344012901,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...2,"startTim..p3979070...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..dexpiry....3984400,"origi
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1577
                                                                                                                                                                                                                  Entropy (8bit):6.3276486263012774
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSsBuLXnIgm/pnxQwRlszT5sKt0Bc3eHVQj6TpamhujJlOsIomNVr02:GUpOxuGnR6X3eHTp4JlIq4w4
                                                                                                                                                                                                                  MD5:9AEA65B96191ED56DF8CD2B187A700E8
                                                                                                                                                                                                                  SHA1:521B67413D050335D46C815E500D706575F4820D
                                                                                                                                                                                                                  SHA-256:49D6EF8B46195DCA523B917A67416437EC2E89B85EBD82185FDA2AEAC6C4621B
                                                                                                                                                                                                                  SHA-512:40F12BDE2275ECA337FD71BC78D2E0158E8689FD228579B5D6BE50D5F9C9FD6CC821977B6BF54A84FE842D11D0B963D644EF925FE2CB2A7F7E7CF5C39A564C9E
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5ebbc55e-bdce-408b-93e2-87251f0cada2}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730344012901,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...2,"startTim..p3979070...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..dexpiry....3984400,"origi
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):1577
                                                                                                                                                                                                                  Entropy (8bit):6.3276486263012774
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:v+USUGlcAxSsBuLXnIgm/pnxQwRlszT5sKt0Bc3eHVQj6TpamhujJlOsIomNVr02:GUpOxuGnR6X3eHTp4JlIq4w4
                                                                                                                                                                                                                  MD5:9AEA65B96191ED56DF8CD2B187A700E8
                                                                                                                                                                                                                  SHA1:521B67413D050335D46C815E500D706575F4820D
                                                                                                                                                                                                                  SHA-256:49D6EF8B46195DCA523B917A67416437EC2E89B85EBD82185FDA2AEAC6C4621B
                                                                                                                                                                                                                  SHA-512:40F12BDE2275ECA337FD71BC78D2E0158E8689FD228579B5D6BE50D5F9C9FD6CC821977B6BF54A84FE842D11D0B963D644EF925FE2CB2A7F7E7CF5C39A564C9E
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5ebbc55e-bdce-408b-93e2-87251f0cada2}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730344012901,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...2,"startTim..p3979070...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..dexpiry....3984400,"origi
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):4096
                                                                                                                                                                                                                  Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                  MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                  SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                  SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                  SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):4537
                                                                                                                                                                                                                  Entropy (8bit):5.03333074163527
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:48:YrSAYnHp6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcb5:ycJyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                  MD5:41C3CB4C6C73BF4D6C134C80B013FCE5
                                                                                                                                                                                                                  SHA1:416D0ED7CA823FA5F929EEA8FB1D425C4DF19389
                                                                                                                                                                                                                  SHA-256:53E0EC30FE68070EA74AB2EE066BFCEA560D9BFE0E58053F1116750278DCC1FE
                                                                                                                                                                                                                  SHA-512:FD57AEFCEE4D69B3C8E0580887DBEFF92C26A0D912297C9BE531B0245CF2F6A032196886C8B1B17254EB682BB46EFCECB503EAD73A152B6BFD5E365E4E7D8547
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-31T03:06:33.138Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                  Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  File Type:JSON data
                                                                                                                                                                                                                  Category:dropped
                                                                                                                                                                                                                  Size (bytes):4537
                                                                                                                                                                                                                  Entropy (8bit):5.03333074163527
                                                                                                                                                                                                                  Encrypted:false
                                                                                                                                                                                                                  SSDEEP:48:YrSAYnHp6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcb5:ycJyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                  MD5:41C3CB4C6C73BF4D6C134C80B013FCE5
                                                                                                                                                                                                                  SHA1:416D0ED7CA823FA5F929EEA8FB1D425C4DF19389
                                                                                                                                                                                                                  SHA-256:53E0EC30FE68070EA74AB2EE066BFCEA560D9BFE0E58053F1116750278DCC1FE
                                                                                                                                                                                                                  SHA-512:FD57AEFCEE4D69B3C8E0580887DBEFF92C26A0D912297C9BE531B0245CF2F6A032196886C8B1B17254EB682BB46EFCECB503EAD73A152B6BFD5E365E4E7D8547
                                                                                                                                                                                                                  Malicious:false
                                                                                                                                                                                                                  Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-10-31T03:06:33.138Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                  Entropy (8bit):6.58467894034033
                                                                                                                                                                                                                  TrID:
                                                                                                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                  File name:file.exe
                                                                                                                                                                                                                  File size:919'552 bytes
                                                                                                                                                                                                                  MD5:f75d194e93d6d5623177ef886053c197
                                                                                                                                                                                                                  SHA1:612a46e69761feb1a44add24ad6d760f3b6fa6cd
                                                                                                                                                                                                                  SHA256:86d0c493a79667fb6a9d7f24c0373924b582c8f2db797666df9324678af02f9b
                                                                                                                                                                                                                  SHA512:cb7682a138b77d21308fe040f8e8bbb0912bbe0323916cfb816fd5b346917f9784fdc4b386546014d1c0cad9ffe39ba1ed89ba94cfe8f2b86154ac6ab405ce03
                                                                                                                                                                                                                  SSDEEP:12288:JqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/Tf:JqDEvCTbMWu7rQYlBQcBiT6rprG8abf
                                                                                                                                                                                                                  TLSH:81159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                  Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                  Entrypoint:0x420577
                                                                                                                                                                                                                  Entrypoint Section:.text
                                                                                                                                                                                                                  Digitally signed:false
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  Subsystem:windows gui
                                                                                                                                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                  Time Stamp:0x6722E0AF [Thu Oct 31 01:43:11 2024 UTC]
                                                                                                                                                                                                                  TLS Callbacks:
                                                                                                                                                                                                                  CLR (.Net) Version:
                                                                                                                                                                                                                  OS Version Major:5
                                                                                                                                                                                                                  OS Version Minor:1
                                                                                                                                                                                                                  File Version Major:5
                                                                                                                                                                                                                  File Version Minor:1
                                                                                                                                                                                                                  Subsystem Version Major:5
                                                                                                                                                                                                                  Subsystem Version Minor:1
                                                                                                                                                                                                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                  Instruction
                                                                                                                                                                                                                  call 00007FA64C8F0243h
                                                                                                                                                                                                                  jmp 00007FA64C8EFB4Fh
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                  push dword ptr [ebp+08h]
                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                  call 00007FA64C8EFD2Dh
                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                  mov eax, ecx
                                                                                                                                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                  mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                  push dword ptr [ebp+08h]
                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                  call 00007FA64C8EFCFAh
                                                                                                                                                                                                                  mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                  mov eax, ecx
                                                                                                                                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                  mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                  and dword ptr [eax], 00000000h
                                                                                                                                                                                                                  and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                  mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                  add eax, 04h
                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                  call 00007FA64C8F28EDh
                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                  mov eax, esi
                                                                                                                                                                                                                  pop esi
                                                                                                                                                                                                                  pop ebp
                                                                                                                                                                                                                  retn 0004h
                                                                                                                                                                                                                  lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                  mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                  call 00007FA64C8F2938h
                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                  ret
                                                                                                                                                                                                                  push ebp
                                                                                                                                                                                                                  mov ebp, esp
                                                                                                                                                                                                                  push esi
                                                                                                                                                                                                                  mov esi, ecx
                                                                                                                                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                  push eax
                                                                                                                                                                                                                  call 00007FA64C8F2921h
                                                                                                                                                                                                                  test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                  pop ecx
                                                                                                                                                                                                                  Programming Language:
                                                                                                                                                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                  .rsrc0xd40000x9c280x9e00d93548a6906b7e2ae0e3fc7b13bbeef0False0.3156398338607595data5.373509352483282IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                  RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                  RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                  RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                  RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                  RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                  RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                  RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                  RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                  RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                  RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                  RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                  RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                  RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                  RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                  RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                  RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                  RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                  RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                  RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                  RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                  RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                  RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                  RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                  RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                  RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                  RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                  DLLImport
                                                                                                                                                                                                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                  UxTheme.dllIsThemeActive
                                                                                                                                                                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                  EnglishGreat Britain
                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.291361094 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.291421890 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.291484118 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.295938015 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.295977116 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.915666103 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.915735960 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924426079 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924451113 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924588919 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924624920 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924918890 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924942017 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.924971104 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.925031900 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.926395893 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.926409960 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.538528919 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.538597107 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.543788910 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.543804884 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.543884993 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.543942928 CET4434973735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:03.544013023 CET49737443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.769130945 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.769162893 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.771270990 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.772757053 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.772775888 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.779772043 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.779798985 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.780874968 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.782324076 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.782342911 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.802645922 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.807455063 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.807528973 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.807697058 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.812503099 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.144912958 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.144939899 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.145019054 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.146486998 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.146502018 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262584925 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262608051 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262775898 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262919903 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262940884 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.300362110 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.300406933 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.300546885 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.301909924 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.301932096 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.329907894 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.329931021 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.335196018 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.335351944 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.335366964 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.402251005 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.457602024 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.625354052 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.630178928 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.631210089 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.631360054 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.636070013 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.636082888 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.637109995 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.641346931 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.641360998 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.645915031 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.645925999 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.645998001 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.646135092 CET44349740172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.647236109 CET49740443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.649864912 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.649944067 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.650859118 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.650952101 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654128075 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654136896 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654223919 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654408932 CET44349739172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654532909 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654575109 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654596090 CET49739443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.654793024 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.656100988 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.656116962 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.764168024 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.764229059 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.768867970 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.768872023 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.768966913 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.769191027 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.769269943 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.769282103 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.769433975 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.769469023 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.770747900 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.770759106 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.872554064 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.872622967 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.875647068 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.875650883 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.875917912 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.878537893 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.878612995 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.878724098 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.878778934 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.914802074 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.914874077 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.919143915 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.919152021 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.919217110 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.919318914 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.919418097 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.920268059 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.925714970 CET804974134.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.925772905 CET4974180192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.948045015 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.956868887 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.959964991 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.959971905 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.960419893 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962423086 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962532997 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962630033 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962889910 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962939978 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962964058 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.962964058 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.963095903 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.963227987 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.963243961 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.178817987 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.178836107 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.179361105 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.180902004 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.182302952 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.182316065 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.184129000 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.197559118 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.197613001 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.202452898 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.234364033 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.234568119 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.239717007 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.239804029 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.375770092 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.375890970 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.385848045 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.385857105 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.385931969 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.386214018 CET4434974934.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.386281013 CET49749443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.508193970 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.508270025 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.510668993 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.510730028 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.515080929 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.515091896 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.515166998 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.515552998 CET44349747172.217.18.14192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.515609980 CET49747443192.168.2.4172.217.18.14
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.577821016 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.583328009 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.598637104 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.603388071 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.603425026 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.603729010 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.605698109 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.605767012 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.605916977 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.694125891 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.694175005 CET4434975434.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.700057030 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.708091974 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.708112001 CET4434975434.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.791224003 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.792109013 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.794250011 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801018000 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801023006 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801132917 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801186085 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801446915 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.801476002 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.813998938 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.814106941 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.815618992 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.815633059 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.834485054 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.910695076 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.910717964 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.911112070 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.911246061 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.911261082 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.911978960 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.912003040 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.912233114 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.913634062 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.913645983 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.949893951 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.954802036 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.959486961 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.959597111 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.964562893 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.108081102 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.108181000 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.108680964 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.110117912 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.110150099 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.342848063 CET4434975434.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.342946053 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.370117903 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.370146036 CET4434975434.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.370182037 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.370650053 CET4434975434.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.372345924 CET49754443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.421497107 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.421509981 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.422372103 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.454087019 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.454092979 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.454160929 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.454313040 CET4434975534.117.188.166192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.454571962 CET49755443192.168.2.434.117.188.166
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.521409035 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.526036024 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.526779890 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.526822090 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.564577103 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.611231089 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.624584913 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.624600887 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.624836922 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634144068 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634280920 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634447098 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634454012 CET4434975635.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634541035 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634613037 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634648085 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634819984 CET4434975734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634948969 CET49757443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.634963036 CET49756443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.720210075 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.722592115 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.751784086 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.751831055 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.751899004 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.751981974 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.752249002 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.752268076 CET4434976134.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.753122091 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.753154993 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.754565001 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.754576921 CET4434976134.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.378343105 CET4434976134.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.378432035 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.383496046 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.383512974 CET4434976134.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.383589983 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.383919954 CET4434976134.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:08.383982897 CET49761443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.868216038 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.873116970 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.992748022 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.024749994 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.024775982 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.024887085 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.026274920 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.026288033 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.034498930 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.642124891 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.642206907 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.647066116 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.647073030 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.647241116 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.647500992 CET4434976234.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.647567034 CET49762443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.029676914 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.034487963 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.043623924 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045196056 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045286894 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.047867060 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.048439980 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.049226999 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.049263954 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060826063 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060846090 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060985088 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061012983 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061043978 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061144114 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061152935 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061232090 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061306000 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061321020 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.155708075 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.168922901 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.198215961 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.213920116 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.657738924 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.659246922 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.663491964 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.663516998 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.663566113 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.663731098 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.663980961 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.674909115 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.674974918 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.677351952 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.677365065 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.677586079 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.679125071 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.680047035 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.682535887 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.682540894 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.682737112 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.683159113 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.683227062 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.683350086 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.684072971 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.686256886 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.686340094 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.686606884 CET4434976634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.688489914 CET49766443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.766088963 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.771251917 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.796435118 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.801367998 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.892826080 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.921694994 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.943908930 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.964127064 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:16.950062037 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:16.955068111 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:17.076512098 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:17.130266905 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.284892082 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.284944057 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.286223888 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.806175947 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.806205988 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.426012993 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.426089048 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.431001902 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.431016922 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.431109905 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.431225061 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.431987047 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.433907986 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.438821077 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.558335066 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.560961962 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.566262960 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.600661039 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.687433004 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.741576910 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.560197115 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.565058947 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.664652109 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.664748907 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.665072918 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.666366100 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.666404009 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.691747904 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.697813988 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.323621988 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.323858976 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.328042984 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.328072071 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.328130007 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.328366041 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.330409050 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.335246086 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.346929073 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455502033 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455528975 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455784082 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.456887007 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.457010984 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.457019091 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.460017920 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.460041046 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.460669041 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.460792065 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.460804939 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.461838961 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.465362072 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.465370893 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.465513945 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.465636015 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.465646029 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.466625929 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.474219084 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.474276066 CET4434977735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.478501081 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.479996920 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.480030060 CET4434977735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.490386009 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.490428925 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.490566015 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.491929054 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.491942883 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.509716988 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.587980032 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.634047031 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.074974060 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.075046062 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.077936888 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.077943087 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.078155994 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.080235004 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.080334902 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.080353022 CET4434977534.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.080681086 CET49775443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.083235979 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.088020086 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.100478888 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.100562096 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.103776932 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.103952885 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.106481075 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.106487989 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107144117 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107153893 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107270002 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107284069 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107296944 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.107738018 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.108407021 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.108427048 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.108542919 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.109930038 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.109941959 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.110645056 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.110733986 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.110837936 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.110888004 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.115771055 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.115844965 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.117666960 CET4434977735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.117739916 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.118546009 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.118551016 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.118747950 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.122441053 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.122531891 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.122565031 CET44349776151.101.193.91192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.122997999 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.123019934 CET4434977735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.123061895 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.123239994 CET4434977735.190.72.216192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.123764038 CET49776443192.168.2.4151.101.193.91
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.123770952 CET49777443192.168.2.435.190.72.216
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.128746033 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.128770113 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.129026890 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.129141092 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.129147053 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.130435944 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.130446911 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.130706072 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.130803108 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.130808115 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.132317066 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.132328033 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.132539988 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.132620096 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.132627964 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.208408117 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.214181900 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.219136000 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.252111912 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.341469049 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.390228033 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.728265047 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.728349924 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.733169079 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.733176947 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.733285904 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.733315945 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.733529091 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.736304998 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.736402035 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.738003969 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.741488934 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.741493940 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.741688013 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.741754055 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.742808104 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.744466066 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.744535923 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.744573116 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.745466948 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.745506048 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.745665073 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.748245001 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.748264074 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.749139071 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.751013994 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.751111031 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.751455069 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.751847029 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.752993107 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.752993107 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.753020048 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.756256104 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.756259918 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.756577015 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.758491039 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.758586884 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.758671045 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.759501934 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.759541035 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.763305902 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.763351917 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.763513088 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.763588905 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.763596058 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.862453938 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.865053892 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.869955063 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.905682087 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.991380930 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.038883924 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.384399891 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.389728069 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.392586946 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.392613888 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.392973900 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.394747019 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.394856930 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.395165920 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.396024942 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.398083925 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.402890921 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.522789955 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.525382042 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.530179024 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.571521997 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.651482105 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.693986893 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.534745932 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.539711952 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.672806025 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.677628994 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.607599974 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.607661963 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.607736111 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.609114885 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.609132051 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.234746933 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.234852076 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.239727020 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.239753962 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.239811897 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.239928961 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.240817070 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.242649078 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.247457027 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.367474079 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.370196104 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.375405073 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.413681030 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.496608973 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.545279026 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.625655890 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.630489111 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.750456095 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.753299952 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.758048058 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.797125101 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.878952026 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.919547081 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.322979927 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323066950 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323244095 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323271036 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323369026 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323388100 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323633909 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323646069 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323647022 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323889971 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.323921919 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.324006081 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.324021101 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.324076891 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.324089050 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.932725906 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.933043957 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.936259985 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.936265945 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.936503887 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.938466072 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.938550949 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.938612938 CET4434981534.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.940073013 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.940093994 CET49815443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.962016106 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.962779999 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.967334986 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.971329927 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.972136021 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.972230911 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.975200891 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.975236893 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.975487947 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.977468967 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.977478027 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.977727890 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980092049 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980175018 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980241060 CET4434981434.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980247021 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980298996 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980391979 CET4434981634.120.208.123192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980561018 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980566978 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980597019 CET49814443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.980839014 CET49816443192.168.2.434.120.208.123
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.983479977 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.988987923 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.108592987 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.112392902 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.117445946 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.160634041 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.239116907 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.281630993 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.121982098 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.126924992 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.253621101 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.258424997 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.134639025 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.141069889 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.266171932 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.271225929 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.147862911 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.152754068 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.279431105 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.284291029 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.971040010 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.971062899 CET4434998334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.971287966 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.972728014 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.972742081 CET4434998334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.577543974 CET4434998334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.577619076 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.583535910 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.583544016 CET4434998334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.583621025 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.583688021 CET4434998334.107.243.93192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.586340904 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.586502075 CET49983443192.168.2.434.107.243.93
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.591197968 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.711606026 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.715151072 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.720777988 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.752572060 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.841911077 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.884103060 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.714224100 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.721066952 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.845762968 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.850604057 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.747894049 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.753971100 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.863806009 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.869204998 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.759191990 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.764086962 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.875101089 CET4975880192.168.2.434.107.221.82
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.880055904 CET804975834.107.221.82192.168.2.4
                                                                                                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.291743040 CET6542753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.298867941 CET53654271.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.299483061 CET5316353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.306765079 CET53531631.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.754163027 CET6167553192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.754424095 CET5568453192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.763176918 CET53616751.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.764195919 CET4928553192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.769932032 CET5884053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.772407055 CET53492851.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.780071974 CET53588401.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.781528950 CET5870253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.786246061 CET5127253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.788544893 CET53587021.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.794055939 CET53512721.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.136504889 CET6041853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.144092083 CET53604181.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.145042896 CET6425153192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.151498079 CET53642511.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.157772064 CET6443953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.164377928 CET53644391.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262729883 CET6544553192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.269695044 CET53654451.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.273375988 CET6213053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.280076981 CET53621301.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.286751986 CET4922153192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.293541908 CET53492211.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.300503016 CET6485253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.309004068 CET53648521.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.320363045 CET6259053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.326989889 CET6384953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.327224970 CET53625901.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.330132961 CET5354353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.334379911 CET53638491.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.337034941 CET53535431.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.343063116 CET5063653192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.349860907 CET53506361.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.606740952 CET5782653192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.607271910 CET6118153192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.613768101 CET53578261.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.613934040 CET53611811.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.615407944 CET6390253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.428725004 CET4939053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.448271036 CET5497253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.454906940 CET53549721.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.460263014 CET53636011.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.461581945 CET5727453192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.468296051 CET53572741.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.469417095 CET5243353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.477121115 CET53524331.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.926525116 CET5387753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.933176994 CET53538771.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.933794975 CET6343353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.940380096 CET53634331.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.099066973 CET5096853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.105887890 CET53509681.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.108601093 CET4957553192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.115279913 CET53495751.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.120337009 CET5665753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.127116919 CET53566571.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.775842905 CET5056253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.782677889 CET53505621.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.796979904 CET5497053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.826704979 CET53549701.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.835068941 CET5927853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.898294926 CET53592781.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014005899 CET5312753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014273882 CET5047153192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014520884 CET6538753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET53531271.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021250010 CET53653871.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021260023 CET53504711.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.026288986 CET6032753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.026802063 CET5493353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.027220011 CET6370453192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.029700041 CET5032153192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET53603271.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.033394098 CET53549331.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.033440113 CET5263753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.034224033 CET53637041.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.035573006 CET5867353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.036947966 CET6479353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.040549994 CET53526371.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.042201042 CET53586731.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.043723106 CET53647931.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045624018 CET5546353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045950890 CET5043253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.051170111 CET5069853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET53554631.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052618980 CET53504321.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.053208113 CET5139853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.053294897 CET6190353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.057698965 CET53506981.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.059933901 CET53619031.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060084105 CET53513981.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060430050 CET6159353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061542988 CET5357853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.067039967 CET53615931.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.068300962 CET53535781.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.805159092 CET6238253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.811878920 CET53623821.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.664927959 CET6383453192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.671596050 CET53638341.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455097914 CET5260053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455853939 CET5035353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.463259935 CET53503531.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.470664024 CET6137353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.477714062 CET53613731.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.480431080 CET5025953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.481343031 CET5587353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.487498999 CET53502591.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.488667011 CET5840753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.489511013 CET53558731.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.495569944 CET53584071.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.508675098 CET5766053192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.516937017 CET53576601.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.519299030 CET53526001.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.536077976 CET5496953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.538539886 CET5648353192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.542839050 CET53549691.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.545486927 CET53564831.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.550163031 CET6279253192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.558056116 CET53627921.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.599376917 CET5566753192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.606045008 CET53556671.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.607196093 CET6334853192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.613889933 CET53633481.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.242918015 CET4923953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.303011894 CET6213953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.310189962 CET53621391.1.1.1192.168.2.4
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.971880913 CET5380953192.168.2.41.1.1.1
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.978529930 CET53538091.1.1.1192.168.2.4
                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.291743040 CET192.168.2.41.1.1.10xb4e1Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.299483061 CET192.168.2.41.1.1.10x8af0Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.754163027 CET192.168.2.41.1.1.10x1353Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.754424095 CET192.168.2.41.1.1.10xc65fStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.764195919 CET192.168.2.41.1.1.10x6dcfStandard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.769932032 CET192.168.2.41.1.1.10xc96eStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.781528950 CET192.168.2.41.1.1.10x61a9Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.786246061 CET192.168.2.41.1.1.10xddf4Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.136504889 CET192.168.2.41.1.1.10xf13aStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.145042896 CET192.168.2.41.1.1.10x9b77Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.157772064 CET192.168.2.41.1.1.10x38c0Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.262729883 CET192.168.2.41.1.1.10x971dStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.273375988 CET192.168.2.41.1.1.10x7131Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.286751986 CET192.168.2.41.1.1.10x5c23Standard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.300503016 CET192.168.2.41.1.1.10x4f34Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.320363045 CET192.168.2.41.1.1.10xbb40Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.326989889 CET192.168.2.41.1.1.10x76f6Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.330132961 CET192.168.2.41.1.1.10xb8a3Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.343063116 CET192.168.2.41.1.1.10x14baStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.606740952 CET192.168.2.41.1.1.10xbf71Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.607271910 CET192.168.2.41.1.1.10x51cfStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.615407944 CET192.168.2.41.1.1.10x8dd0Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.428725004 CET192.168.2.41.1.1.10xc089Standard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.448271036 CET192.168.2.41.1.1.10x5372Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.461581945 CET192.168.2.41.1.1.10x897fStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.469417095 CET192.168.2.41.1.1.10x22caStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.926525116 CET192.168.2.41.1.1.10x8711Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.933794975 CET192.168.2.41.1.1.10xbd52Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.099066973 CET192.168.2.41.1.1.10x6214Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.108601093 CET192.168.2.41.1.1.10xc3d5Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.120337009 CET192.168.2.41.1.1.10xd3a8Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.775842905 CET192.168.2.41.1.1.10x611dStandard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.796979904 CET192.168.2.41.1.1.10x383dStandard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.835068941 CET192.168.2.41.1.1.10x7504Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014005899 CET192.168.2.41.1.1.10x6d0aStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014273882 CET192.168.2.41.1.1.10x3311Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.014520884 CET192.168.2.41.1.1.10xad0dStandard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.026288986 CET192.168.2.41.1.1.10xe592Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.026802063 CET192.168.2.41.1.1.10xb3feStandard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.027220011 CET192.168.2.41.1.1.10xd5cbStandard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.029700041 CET192.168.2.41.1.1.10x5d19Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.033440113 CET192.168.2.41.1.1.10x78a7Standard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.035573006 CET192.168.2.41.1.1.10xd679Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.036947966 CET192.168.2.41.1.1.10xf3a0Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045624018 CET192.168.2.41.1.1.10x8130Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.045950890 CET192.168.2.41.1.1.10x3fa3Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.051170111 CET192.168.2.41.1.1.10x6c81Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.053208113 CET192.168.2.41.1.1.10x6c8Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.053294897 CET192.168.2.41.1.1.10x686fStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060430050 CET192.168.2.41.1.1.10x4f2Standard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.061542988 CET192.168.2.41.1.1.10xe4aStandard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:19.805159092 CET192.168.2.41.1.1.10x6847Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.664927959 CET192.168.2.41.1.1.10xfa17Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455097914 CET192.168.2.41.1.1.10xcadbStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455853939 CET192.168.2.41.1.1.10xec70Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.470664024 CET192.168.2.41.1.1.10x9346Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.480431080 CET192.168.2.41.1.1.10xd3b2Standard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.481343031 CET192.168.2.41.1.1.10x52e2Standard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.488667011 CET192.168.2.41.1.1.10x1236Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.508675098 CET192.168.2.41.1.1.10x9b32Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.536077976 CET192.168.2.41.1.1.10x710bStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.538539886 CET192.168.2.41.1.1.10xea60Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.550163031 CET192.168.2.41.1.1.10xea6cStandard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.599376917 CET192.168.2.41.1.1.10x1dbStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.607196093 CET192.168.2.41.1.1.10x5750Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.242918015 CET192.168.2.41.1.1.10xb1c4Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.303011894 CET192.168.2.41.1.1.10xc48cStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.971880913 CET192.168.2.41.1.1.10x5d0cStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.289108038 CET1.1.1.1192.168.2.40xfd20No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:02.298867941 CET1.1.1.1192.168.2.40xb4e1No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.762990952 CET1.1.1.1192.168.2.40xc65fNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.762990952 CET1.1.1.1192.168.2.40xc65fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.763176918 CET1.1.1.1192.168.2.40x1353No error (0)youtube.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.772407055 CET1.1.1.1192.168.2.40x6dcfNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.780071974 CET1.1.1.1192.168.2.40xc96eNo error (0)youtube.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.788544893 CET1.1.1.1192.168.2.40x61a9No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.794055939 CET1.1.1.1192.168.2.40xddf4No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.144092083 CET1.1.1.1192.168.2.40xf13aNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.151498079 CET1.1.1.1192.168.2.40x9b77No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.261852980 CET1.1.1.1192.168.2.40x1fafNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.261852980 CET1.1.1.1192.168.2.40x1fafNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.269695044 CET1.1.1.1192.168.2.40x971dNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.293541908 CET1.1.1.1192.168.2.40x5c23No error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.293541908 CET1.1.1.1192.168.2.40x5c23No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.309004068 CET1.1.1.1192.168.2.40x4f34No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.327224970 CET1.1.1.1192.168.2.40xbb40No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.327224970 CET1.1.1.1192.168.2.40xbb40No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.327224970 CET1.1.1.1192.168.2.40xbb40No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.337034941 CET1.1.1.1192.168.2.40xb8a3No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.349860907 CET1.1.1.1192.168.2.40x14baNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.613768101 CET1.1.1.1192.168.2.40xbf71No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.613934040 CET1.1.1.1192.168.2.40x51cfNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.613934040 CET1.1.1.1192.168.2.40x51cfNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.622009039 CET1.1.1.1192.168.2.40x8dd0No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.622009039 CET1.1.1.1192.168.2.40x8dd0No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.436199903 CET1.1.1.1192.168.2.40xc089No error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.454906940 CET1.1.1.1192.168.2.40x5372No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.468296051 CET1.1.1.1192.168.2.40x897fNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.898704052 CET1.1.1.1192.168.2.40x47e0No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.898763895 CET1.1.1.1192.168.2.40xaea1No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.898763895 CET1.1.1.1192.168.2.40xaea1No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.933176994 CET1.1.1.1192.168.2.40x8711No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.105887890 CET1.1.1.1192.168.2.40x6214No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.105887890 CET1.1.1.1192.168.2.40x6214No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.115279913 CET1.1.1.1192.168.2.40xc3d5No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.782677889 CET1.1.1.1192.168.2.40x611dNo error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.782677889 CET1.1.1.1192.168.2.40x611dNo error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.782677889 CET1.1.1.1192.168.2.40x611dNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.826704979 CET1.1.1.1192.168.2.40x383dNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:11.024012089 CET1.1.1.1192.168.2.40xcacfNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com216.58.212.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.020822048 CET1.1.1.1192.168.2.40x6d0aNo error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021250010 CET1.1.1.1192.168.2.40xad0dNo error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021250010 CET1.1.1.1192.168.2.40xad0dNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021260023 CET1.1.1.1192.168.2.40x3311No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.021260023 CET1.1.1.1192.168.2.40x3311No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.032921076 CET1.1.1.1192.168.2.40xe592No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.033394098 CET1.1.1.1192.168.2.40xb3feNo error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.034224033 CET1.1.1.1192.168.2.40xd5cbNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.036504984 CET1.1.1.1192.168.2.40x5d19No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.036504984 CET1.1.1.1192.168.2.40x5d19No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.040549994 CET1.1.1.1192.168.2.40x78a7No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.040549994 CET1.1.1.1192.168.2.40x78a7No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.040549994 CET1.1.1.1192.168.2.40x78a7No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.040549994 CET1.1.1.1192.168.2.40x78a7No error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.042201042 CET1.1.1.1192.168.2.40xd679No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.043723106 CET1.1.1.1192.168.2.40xf3a0No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET1.1.1.1192.168.2.40x8130No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET1.1.1.1192.168.2.40x8130No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET1.1.1.1192.168.2.40x8130No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET1.1.1.1192.168.2.40x8130No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052115917 CET1.1.1.1192.168.2.40x8130No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.052618980 CET1.1.1.1192.168.2.40x3fa3No error (0)twitter.com104.244.42.129A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.059933901 CET1.1.1.1192.168.2.40x686fNo error (0)twitter.com104.244.42.65A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060084105 CET1.1.1.1192.168.2.40x6c8No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060084105 CET1.1.1.1192.168.2.40x6c8No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060084105 CET1.1.1.1192.168.2.40x6c8No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.060084105 CET1.1.1.1192.168.2.40x6c8No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.463259935 CET1.1.1.1192.168.2.40xec70No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.463259935 CET1.1.1.1192.168.2.40xec70No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.463259935 CET1.1.1.1192.168.2.40xec70No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.463259935 CET1.1.1.1192.168.2.40xec70No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.477714062 CET1.1.1.1192.168.2.40x9346No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.477714062 CET1.1.1.1192.168.2.40x9346No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.477714062 CET1.1.1.1192.168.2.40x9346No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.477714062 CET1.1.1.1192.168.2.40x9346No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.481406927 CET1.1.1.1192.168.2.40x70aaNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.487498999 CET1.1.1.1192.168.2.40xd3b2No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.487498999 CET1.1.1.1192.168.2.40xd3b2No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.487498999 CET1.1.1.1192.168.2.40xd3b2No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.487498999 CET1.1.1.1192.168.2.40xd3b2No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.489511013 CET1.1.1.1192.168.2.40x52e2No error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.489511013 CET1.1.1.1192.168.2.40x52e2No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.495569944 CET1.1.1.1192.168.2.40x1236No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.519299030 CET1.1.1.1192.168.2.40xcadbNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.545486927 CET1.1.1.1192.168.2.40xea60No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.773986101 CET1.1.1.1192.168.2.40x9bd9No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.773986101 CET1.1.1.1192.168.2.40x9bd9No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:51.606045008 CET1.1.1.1192.168.2.40x1dbNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.249910116 CET1.1.1.1192.168.2.40xb1c4No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.249910116 CET1.1.1.1192.168.2.40xb1c4No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.297331095 CET1.1.1.1192.168.2.40x804cNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                  • detectportal.firefox.com
                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                  0192.168.2.44974134.107.221.82807116C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                  Oct 31, 2024 02:59:04.807697058 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.402251005 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77272
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                  1192.168.2.44974634.107.221.82807116C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                  Oct 31, 2024 02:59:05.631360054 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.234364033 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77295
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success


                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                  2192.168.2.44975234.107.221.82807116C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.197613001 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.792109013 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77273
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.868216038 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:10.992748022 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77277
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.043623924 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.168922901 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77282
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.796435118 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.921694994 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77282
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.433907986 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.558335066 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77287
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.560197115 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.330409050 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.455784082 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77298
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.083235979 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.208408117 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77299
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.736402035 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.862453938 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77299
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.398083925 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.522789955 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77300
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.534745932 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.242649078 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.367474079 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77319
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.625655890 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.750456095 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77326
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 03:00:01.983479977 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.108592987 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77329
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.121982098 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.134639025 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.147862911 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.586340904 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.711606026 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 90
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:31:13 GMT
                                                                                                                                                                                                                  Age: 77360
                                                                                                                                                                                                                  Content-Type: text/html
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                  Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.714224100 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.747894049 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.759191990 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:


                                                                                                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                  3192.168.2.44975834.107.221.82807116C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                                                                                                  Oct 31, 2024 02:59:06.959597111 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:07.564577103 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77296
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.029676914 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.155708075 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77304
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.766088963 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:15.892826080 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77304
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:16.950062037 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:17.076512098 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77306
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.560961962 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:20.687433004 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77309
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:30.691747904 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.461838961 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:31.587980032 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77320
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.214181900 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.341469049 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77321
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.865053892 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:32.991380930 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77321
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.525382042 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:33.651482105 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77322
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:43.672806025 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.370196104 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:52.496608973 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77341
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.753299952 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 02:59:59.878952026 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77348
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.112392902 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 03:00:02.239116907 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77351
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 03:00:12.253621101 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:22.266171932 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:32.279431105 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.715151072 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                  Host: detectportal.firefox.com
                                                                                                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                  Accept: */*
                                                                                                                                                                                                                  Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                  Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                  Connection: keep-alive
                                                                                                                                                                                                                  Pragma: no-cache
                                                                                                                                                                                                                  Cache-Control: no-cache
                                                                                                                                                                                                                  Oct 31, 2024 03:00:33.841911077 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                  Server: nginx
                                                                                                                                                                                                                  Content-Length: 8
                                                                                                                                                                                                                  Via: 1.1 google
                                                                                                                                                                                                                  Date: Wed, 30 Oct 2024 04:30:51 GMT
                                                                                                                                                                                                                  Age: 77382
                                                                                                                                                                                                                  Content-Type: text/plain
                                                                                                                                                                                                                  Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                  Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                  Data Ascii: success
                                                                                                                                                                                                                  Oct 31, 2024 03:00:43.845762968 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:00:53.863806009 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:
                                                                                                                                                                                                                  Oct 31, 2024 03:01:03.875101089 CET6OUTData Raw: 00
                                                                                                                                                                                                                  Data Ascii:


                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                                                                                                  Click to jump to process

                                                                                                                                                                                                                  Target ID:0
                                                                                                                                                                                                                  Start time:21:58:56
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                  Imagebase:0xa20000
                                                                                                                                                                                                                  File size:919'552 bytes
                                                                                                                                                                                                                  MD5 hash:F75D194E93D6D5623177EF886053C197
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:low
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:1
                                                                                                                                                                                                                  Start time:21:58:56
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:2
                                                                                                                                                                                                                  Start time:21:58:56
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:3
                                                                                                                                                                                                                  Start time:21:58:58
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:4
                                                                                                                                                                                                                  Start time:21:58:58
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:5
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:6
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:7
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:8
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:9
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                                                                                                  Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                  Imagebase:0x400000
                                                                                                                                                                                                                  File size:74'240 bytes
                                                                                                                                                                                                                  MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:10
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                  Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                  File size:862'208 bytes
                                                                                                                                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Reputation:high
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:11
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:true
                                                                                                                                                                                                                  Has administrator privileges:true
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:12
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:true

                                                                                                                                                                                                                  Target ID:13
                                                                                                                                                                                                                  Start time:21:58:59
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:15
                                                                                                                                                                                                                  Start time:21:59:00
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2284 -parentBuildID 20230927232528 -prefsHandle 2228 -prefMapHandle 2220 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c47723c7-54b1-42e0-bf30-b0a4735b10ed} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26457170510 socket
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:16
                                                                                                                                                                                                                  Start time:21:59:02
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -parentBuildID 20230927232528 -prefsHandle 4200 -prefMapHandle 4196 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b1c0384d-dc4a-4d4b-84e5-6fa8035d9d07} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26466f2ed10 rdd
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Target ID:17
                                                                                                                                                                                                                  Start time:21:59:06
                                                                                                                                                                                                                  Start date:30/10/2024
                                                                                                                                                                                                                  Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                  Wow64 process (32bit):false
                                                                                                                                                                                                                  Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4876 -prefMapHandle 3932 -prefsLen 33074 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65bb0162-2239-4cbf-af1c-39acaa991dd2} 7116 "\\.\pipe\gecko-crash-server-pipe.7116" 26468d8b710 utility
                                                                                                                                                                                                                  Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                  File size:676'768 bytes
                                                                                                                                                                                                                  MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                  Has elevated privileges:false
                                                                                                                                                                                                                  Has administrator privileges:false
                                                                                                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                                                                                                  Has exited:false

                                                                                                                                                                                                                  Reset < >

                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                    Execution Coverage:2%
                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                    Signature Coverage:4.3%
                                                                                                                                                                                                                    Total number of Nodes:1547
                                                                                                                                                                                                                    Total number of Limit Nodes:53
                                                                                                                                                                                                                    execution_graph 95024 a22de3 95025 a22df0 __wsopen_s 95024->95025 95026 a22e09 95025->95026 95027 a62c2b ___scrt_fastfail 95025->95027 95040 a23aa2 95026->95040 95029 a62c47 GetOpenFileNameW 95027->95029 95031 a62c96 95029->95031 95097 a26b57 95031->95097 95035 a62cab 95035->95035 95037 a22e27 95068 a244a8 95037->95068 95109 a61f50 95040->95109 95043 a23ae9 95115 a2a6c3 95043->95115 95044 a23ace 95045 a26b57 22 API calls 95044->95045 95047 a23ada 95045->95047 95111 a237a0 95047->95111 95050 a22da5 95051 a61f50 __wsopen_s 95050->95051 95052 a22db2 GetLongPathNameW 95051->95052 95053 a26b57 22 API calls 95052->95053 95054 a22dda 95053->95054 95055 a23598 95054->95055 95166 a2a961 95055->95166 95058 a23aa2 23 API calls 95059 a235b5 95058->95059 95060 a235c0 95059->95060 95061 a632eb 95059->95061 95171 a2515f 95060->95171 95066 a6330d 95061->95066 95183 a3ce60 41 API calls 95061->95183 95067 a235df 95067->95037 95184 a24ecb 95068->95184 95071 a63833 95206 a92cf9 95071->95206 95072 a24ecb 94 API calls 95074 a244e1 95072->95074 95074->95071 95076 a244e9 95074->95076 95075 a63848 95077 a6384c 95075->95077 95078 a63869 95075->95078 95080 a63854 95076->95080 95081 a244f5 95076->95081 95233 a24f39 95077->95233 95079 a3fe0b 22 API calls 95078->95079 95096 a638ae 95079->95096 95239 a8da5a 82 API calls 95080->95239 95232 a2940c 136 API calls 2 library calls 95081->95232 95085 a22e31 95086 a63862 95086->95078 95087 a63a5f 95088 a24f39 68 API calls 95087->95088 95245 a8989b 82 API calls __wsopen_s 95087->95245 95088->95087 95093 a29cb3 22 API calls 95093->95096 95096->95087 95096->95093 95240 a8967e 22 API calls __fread_nolock 95096->95240 95241 a895ad 42 API calls _wcslen 95096->95241 95242 a90b5a 22 API calls 95096->95242 95243 a2a4a1 22 API calls __fread_nolock 95096->95243 95244 a23ff7 22 API calls 95096->95244 95098 a26b67 _wcslen 95097->95098 95099 a64ba1 95097->95099 95102 a26ba2 95098->95102 95103 a26b7d 95098->95103 95100 a293b2 22 API calls 95099->95100 95101 a64baa 95100->95101 95101->95101 95104 a3fddb 22 API calls 95102->95104 95560 a26f34 22 API calls 95103->95560 95107 a26bae 95104->95107 95106 a26b85 __fread_nolock 95106->95035 95108 a3fe0b 22 API calls 95107->95108 95108->95106 95110 a23aaf GetFullPathNameW 95109->95110 95110->95043 95110->95044 95112 a237ae 95111->95112 95121 a293b2 95112->95121 95114 a22e12 95114->95050 95116 a2a6d0 95115->95116 95117 a2a6dd 95115->95117 95116->95047 95118 a3fddb 22 API calls 95117->95118 95119 a2a6e7 95118->95119 95120 a3fe0b 22 API calls 95119->95120 95120->95116 95122 a293c0 95121->95122 95124 a293c9 __fread_nolock 95121->95124 95122->95124 95125 a2aec9 95122->95125 95124->95114 95126 a2aedc 95125->95126 95130 a2aed9 __fread_nolock 95125->95130 95131 a3fddb 95126->95131 95128 a2aee7 95141 a3fe0b 95128->95141 95130->95124 95133 a3fde0 95131->95133 95134 a3fdfa 95133->95134 95138 a3fdfc 95133->95138 95151 a4ea0c 95133->95151 95158 a44ead 7 API calls 2 library calls 95133->95158 95134->95128 95136 a4066d 95160 a432a4 RaiseException 95136->95160 95138->95136 95159 a432a4 RaiseException 95138->95159 95139 a4068a 95139->95128 95143 a3fddb 95141->95143 95142 a4ea0c ___std_exception_copy 21 API calls 95142->95143 95143->95142 95144 a3fdfa 95143->95144 95147 a3fdfc 95143->95147 95163 a44ead 7 API calls 2 library calls 95143->95163 95144->95130 95146 a4066d 95165 a432a4 RaiseException 95146->95165 95147->95146 95164 a432a4 RaiseException 95147->95164 95149 a4068a 95149->95130 95155 a53820 _abort 95151->95155 95152 a5385e 95162 a4f2d9 20 API calls _abort 95152->95162 95153 a53849 RtlAllocateHeap 95153->95155 95156 a5385c 95153->95156 95155->95152 95155->95153 95161 a44ead 7 API calls 2 library calls 95155->95161 95156->95133 95158->95133 95159->95136 95160->95139 95161->95155 95162->95156 95163->95143 95164->95146 95165->95149 95167 a3fe0b 22 API calls 95166->95167 95168 a2a976 95167->95168 95169 a3fddb 22 API calls 95168->95169 95170 a235aa 95169->95170 95170->95058 95172 a2516e 95171->95172 95176 a2518f __fread_nolock 95171->95176 95175 a3fe0b 22 API calls 95172->95175 95173 a3fddb 22 API calls 95174 a235cc 95173->95174 95177 a235f3 95174->95177 95175->95176 95176->95173 95178 a23605 95177->95178 95182 a23624 __fread_nolock 95177->95182 95181 a3fe0b 22 API calls 95178->95181 95179 a3fddb 22 API calls 95180 a2363b 95179->95180 95180->95067 95181->95182 95182->95179 95183->95061 95246 a24e90 LoadLibraryA 95184->95246 95189 a24ef6 LoadLibraryExW 95254 a24e59 LoadLibraryA 95189->95254 95190 a63ccf 95192 a24f39 68 API calls 95190->95192 95194 a63cd6 95192->95194 95196 a24e59 3 API calls 95194->95196 95198 a63cde 95196->95198 95197 a24f20 95197->95198 95199 a24f2c 95197->95199 95276 a250f5 95198->95276 95200 a24f39 68 API calls 95199->95200 95202 a244cd 95200->95202 95202->95071 95202->95072 95205 a63d05 95207 a92d15 95206->95207 95208 a2511f 64 API calls 95207->95208 95209 a92d29 95208->95209 95426 a92e66 95209->95426 95212 a92d3f 95212->95075 95213 a250f5 40 API calls 95214 a92d56 95213->95214 95215 a250f5 40 API calls 95214->95215 95216 a92d66 95215->95216 95217 a250f5 40 API calls 95216->95217 95218 a92d81 95217->95218 95219 a250f5 40 API calls 95218->95219 95220 a92d9c 95219->95220 95221 a2511f 64 API calls 95220->95221 95222 a92db3 95221->95222 95223 a4ea0c ___std_exception_copy 21 API calls 95222->95223 95224 a92dba 95223->95224 95225 a4ea0c ___std_exception_copy 21 API calls 95224->95225 95226 a92dc4 95225->95226 95227 a250f5 40 API calls 95226->95227 95228 a92dd8 95227->95228 95229 a928fe 27 API calls 95228->95229 95230 a92dee 95229->95230 95230->95212 95432 a922ce 79 API calls 95230->95432 95232->95085 95234 a24f43 95233->95234 95238 a24f4a 95233->95238 95433 a4e678 95234->95433 95236 a24f6a FreeLibrary 95237 a24f59 95236->95237 95237->95080 95238->95236 95238->95237 95239->95086 95240->95096 95241->95096 95242->95096 95243->95096 95244->95096 95245->95087 95247 a24ec6 95246->95247 95248 a24ea8 GetProcAddress 95246->95248 95251 a4e5eb 95247->95251 95249 a24eb8 95248->95249 95249->95247 95250 a24ebf FreeLibrary 95249->95250 95250->95247 95284 a4e52a 95251->95284 95253 a24eea 95253->95189 95253->95190 95255 a24e6e GetProcAddress 95254->95255 95256 a24e8d 95254->95256 95257 a24e7e 95255->95257 95259 a24f80 95256->95259 95257->95256 95258 a24e86 FreeLibrary 95257->95258 95258->95256 95260 a3fe0b 22 API calls 95259->95260 95261 a24f95 95260->95261 95352 a25722 95261->95352 95263 a24fa1 __fread_nolock 95264 a250a5 95263->95264 95265 a63d1d 95263->95265 95275 a24fdc 95263->95275 95355 a242a2 CreateStreamOnHGlobal 95264->95355 95366 a9304d 74 API calls 95265->95366 95268 a63d22 95270 a2511f 64 API calls 95268->95270 95269 a250f5 40 API calls 95269->95275 95271 a63d45 95270->95271 95272 a250f5 40 API calls 95271->95272 95274 a2506e messages 95272->95274 95274->95197 95275->95268 95275->95269 95275->95274 95361 a2511f 95275->95361 95277 a25107 95276->95277 95278 a63d70 95276->95278 95388 a4e8c4 95277->95388 95281 a928fe 95409 a9274e 95281->95409 95283 a92919 95283->95205 95285 a4e536 ___DestructExceptionObject 95284->95285 95286 a4e544 95285->95286 95289 a4e574 95285->95289 95309 a4f2d9 20 API calls _abort 95286->95309 95288 a4e549 95310 a527ec 26 API calls ___std_exception_copy 95288->95310 95290 a4e586 95289->95290 95291 a4e579 95289->95291 95301 a58061 95290->95301 95311 a4f2d9 20 API calls _abort 95291->95311 95295 a4e58f 95296 a4e595 95295->95296 95297 a4e5a2 95295->95297 95312 a4f2d9 20 API calls _abort 95296->95312 95313 a4e5d4 LeaveCriticalSection __fread_nolock 95297->95313 95298 a4e554 __wsopen_s 95298->95253 95302 a5806d ___DestructExceptionObject 95301->95302 95314 a52f5e EnterCriticalSection 95302->95314 95304 a5807b 95315 a580fb 95304->95315 95308 a580ac __wsopen_s 95308->95295 95309->95288 95310->95298 95311->95298 95312->95298 95313->95298 95314->95304 95322 a5811e 95315->95322 95316 a58088 95328 a580b7 95316->95328 95317 a58177 95333 a54c7d 95317->95333 95322->95316 95322->95317 95331 a4918d EnterCriticalSection 95322->95331 95332 a491a1 LeaveCriticalSection 95322->95332 95323 a58189 95323->95316 95346 a53405 11 API calls 2 library calls 95323->95346 95325 a581a8 95347 a4918d EnterCriticalSection 95325->95347 95351 a52fa6 LeaveCriticalSection 95328->95351 95330 a580be 95330->95308 95331->95322 95332->95322 95339 a54c8a _abort 95333->95339 95334 a54cca 95349 a4f2d9 20 API calls _abort 95334->95349 95335 a54cb5 RtlAllocateHeap 95337 a54cc8 95335->95337 95335->95339 95340 a529c8 95337->95340 95339->95334 95339->95335 95348 a44ead 7 API calls 2 library calls 95339->95348 95341 a529d3 RtlFreeHeap 95340->95341 95345 a529fc _free 95340->95345 95342 a529e8 95341->95342 95341->95345 95350 a4f2d9 20 API calls _abort 95342->95350 95344 a529ee GetLastError 95344->95345 95345->95323 95346->95325 95347->95316 95348->95339 95349->95337 95350->95344 95351->95330 95353 a3fddb 22 API calls 95352->95353 95354 a25734 95353->95354 95354->95263 95356 a242bc FindResourceExW 95355->95356 95360 a242d9 95355->95360 95357 a635ba LoadResource 95356->95357 95356->95360 95358 a635cf SizeofResource 95357->95358 95357->95360 95359 a635e3 LockResource 95358->95359 95358->95360 95359->95360 95360->95275 95362 a63d90 95361->95362 95363 a2512e 95361->95363 95367 a4ece3 95363->95367 95366->95268 95370 a4eaaa 95367->95370 95369 a2513c 95369->95275 95372 a4eab6 ___DestructExceptionObject 95370->95372 95371 a4eac2 95383 a4f2d9 20 API calls _abort 95371->95383 95372->95371 95373 a4eae8 95372->95373 95385 a4918d EnterCriticalSection 95373->95385 95376 a4eac7 95384 a527ec 26 API calls ___std_exception_copy 95376->95384 95378 a4eaf4 95386 a4ec0a 62 API calls 2 library calls 95378->95386 95380 a4eb08 95387 a4eb27 LeaveCriticalSection __fread_nolock 95380->95387 95382 a4ead2 __wsopen_s 95382->95369 95383->95376 95384->95382 95385->95378 95386->95380 95387->95382 95391 a4e8e1 95388->95391 95390 a25118 95390->95281 95392 a4e8ed ___DestructExceptionObject 95391->95392 95393 a4e92d 95392->95393 95394 a4e925 __wsopen_s 95392->95394 95397 a4e900 ___scrt_fastfail 95392->95397 95406 a4918d EnterCriticalSection 95393->95406 95394->95390 95396 a4e937 95407 a4e6f8 38 API calls 4 library calls 95396->95407 95404 a4f2d9 20 API calls _abort 95397->95404 95400 a4e91a 95405 a527ec 26 API calls ___std_exception_copy 95400->95405 95402 a4e94e 95408 a4e96c LeaveCriticalSection __fread_nolock 95402->95408 95404->95400 95405->95394 95406->95396 95407->95402 95408->95394 95412 a4e4e8 95409->95412 95411 a9275d 95411->95283 95415 a4e469 95412->95415 95414 a4e505 95414->95411 95416 a4e48c 95415->95416 95417 a4e478 95415->95417 95421 a4e488 __alldvrm 95416->95421 95425 a5333f 11 API calls 2 library calls 95416->95425 95423 a4f2d9 20 API calls _abort 95417->95423 95420 a4e47d 95424 a527ec 26 API calls ___std_exception_copy 95420->95424 95421->95414 95423->95420 95424->95421 95425->95421 95430 a92e7a 95426->95430 95427 a250f5 40 API calls 95427->95430 95428 a928fe 27 API calls 95428->95430 95429 a92d3b 95429->95212 95429->95213 95430->95427 95430->95428 95430->95429 95431 a2511f 64 API calls 95430->95431 95431->95430 95432->95212 95434 a4e684 ___DestructExceptionObject 95433->95434 95435 a4e695 95434->95435 95436 a4e6aa 95434->95436 95446 a4f2d9 20 API calls _abort 95435->95446 95445 a4e6a5 __wsopen_s 95436->95445 95448 a4918d EnterCriticalSection 95436->95448 95438 a4e69a 95447 a527ec 26 API calls ___std_exception_copy 95438->95447 95441 a4e6c6 95449 a4e602 95441->95449 95443 a4e6d1 95465 a4e6ee LeaveCriticalSection __fread_nolock 95443->95465 95445->95238 95446->95438 95447->95445 95448->95441 95450 a4e624 95449->95450 95451 a4e60f 95449->95451 95457 a4e61f 95450->95457 95468 a4dc0b 95450->95468 95466 a4f2d9 20 API calls _abort 95451->95466 95453 a4e614 95467 a527ec 26 API calls ___std_exception_copy 95453->95467 95457->95443 95461 a4e646 95485 a5862f 95461->95485 95464 a529c8 _free 20 API calls 95464->95457 95465->95445 95466->95453 95467->95457 95469 a4dc23 95468->95469 95473 a4dc1f 95468->95473 95470 a4d955 __fread_nolock 26 API calls 95469->95470 95469->95473 95471 a4dc43 95470->95471 95500 a559be 62 API calls 5 library calls 95471->95500 95474 a54d7a 95473->95474 95475 a4e640 95474->95475 95476 a54d90 95474->95476 95478 a4d955 95475->95478 95476->95475 95477 a529c8 _free 20 API calls 95476->95477 95477->95475 95479 a4d976 95478->95479 95480 a4d961 95478->95480 95479->95461 95501 a4f2d9 20 API calls _abort 95480->95501 95482 a4d966 95502 a527ec 26 API calls ___std_exception_copy 95482->95502 95484 a4d971 95484->95461 95486 a58653 95485->95486 95487 a5863e 95485->95487 95489 a5868e 95486->95489 95493 a5867a 95486->95493 95503 a4f2c6 20 API calls _abort 95487->95503 95508 a4f2c6 20 API calls _abort 95489->95508 95490 a58643 95504 a4f2d9 20 API calls _abort 95490->95504 95505 a58607 95493->95505 95494 a58693 95509 a4f2d9 20 API calls _abort 95494->95509 95497 a4e64c 95497->95457 95497->95464 95498 a5869b 95510 a527ec 26 API calls ___std_exception_copy 95498->95510 95500->95473 95501->95482 95502->95484 95503->95490 95504->95497 95511 a58585 95505->95511 95507 a5862b 95507->95497 95508->95494 95509->95498 95510->95497 95512 a58591 ___DestructExceptionObject 95511->95512 95522 a55147 EnterCriticalSection 95512->95522 95514 a5859f 95515 a585c6 95514->95515 95516 a585d1 95514->95516 95523 a586ae 95515->95523 95538 a4f2d9 20 API calls _abort 95516->95538 95519 a585cc 95539 a585fb LeaveCriticalSection __wsopen_s 95519->95539 95521 a585ee __wsopen_s 95521->95507 95522->95514 95540 a553c4 95523->95540 95525 a586c4 95553 a55333 21 API calls 3 library calls 95525->95553 95526 a586be 95526->95525 95528 a553c4 __wsopen_s 26 API calls 95526->95528 95537 a586f6 95526->95537 95530 a586ed 95528->95530 95529 a553c4 __wsopen_s 26 API calls 95531 a58702 CloseHandle 95529->95531 95534 a553c4 __wsopen_s 26 API calls 95530->95534 95531->95525 95535 a5870e GetLastError 95531->95535 95532 a5873e 95532->95519 95533 a5871c 95533->95532 95554 a4f2a3 20 API calls 2 library calls 95533->95554 95534->95537 95535->95525 95537->95525 95537->95529 95538->95519 95539->95521 95541 a553e6 95540->95541 95542 a553d1 95540->95542 95548 a5540b 95541->95548 95557 a4f2c6 20 API calls _abort 95541->95557 95555 a4f2c6 20 API calls _abort 95542->95555 95545 a553d6 95556 a4f2d9 20 API calls _abort 95545->95556 95546 a55416 95558 a4f2d9 20 API calls _abort 95546->95558 95548->95526 95550 a5541e 95559 a527ec 26 API calls ___std_exception_copy 95550->95559 95551 a553de 95551->95526 95553->95533 95554->95532 95555->95545 95556->95551 95557->95546 95558->95550 95559->95551 95560->95106 95561 a62ba5 95562 a22b25 95561->95562 95563 a62baf 95561->95563 95589 a22b83 7 API calls 95562->95589 95607 a23a5a 95563->95607 95566 a62bb8 95614 a29cb3 95566->95614 95570 a62bc6 95572 a62bf5 95570->95572 95573 a62bce 95570->95573 95571 a22b2f 95579 a22b44 95571->95579 95593 a23837 95571->95593 95576 a233c6 22 API calls 95572->95576 95620 a233c6 95573->95620 95578 a62bf1 GetForegroundWindow ShellExecuteW 95576->95578 95585 a62c26 95578->95585 95580 a22b5f 95579->95580 95603 a230f2 95579->95603 95587 a22b66 SetCurrentDirectoryW 95580->95587 95584 a62be7 95586 a233c6 22 API calls 95584->95586 95585->95580 95586->95578 95588 a22b7a 95587->95588 95630 a22cd4 7 API calls 95589->95630 95591 a22b2a 95592 a22c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95591->95592 95592->95571 95594 a23862 ___scrt_fastfail 95593->95594 95631 a24212 95594->95631 95597 a238e8 95599 a63386 Shell_NotifyIconW 95597->95599 95600 a23906 Shell_NotifyIconW 95597->95600 95635 a23923 95600->95635 95602 a2391c 95602->95579 95604 a23154 95603->95604 95605 a23104 ___scrt_fastfail 95603->95605 95604->95580 95606 a23123 Shell_NotifyIconW 95605->95606 95606->95604 95608 a61f50 __wsopen_s 95607->95608 95609 a23a67 GetModuleFileNameW 95608->95609 95610 a29cb3 22 API calls 95609->95610 95611 a23a8d 95610->95611 95612 a23aa2 23 API calls 95611->95612 95613 a23a97 95612->95613 95613->95566 95615 a29cc2 _wcslen 95614->95615 95616 a3fe0b 22 API calls 95615->95616 95617 a29cea __fread_nolock 95616->95617 95618 a3fddb 22 API calls 95617->95618 95619 a29d00 95618->95619 95619->95570 95621 a630bb 95620->95621 95622 a233dd 95620->95622 95623 a3fddb 22 API calls 95621->95623 95666 a233ee 95622->95666 95626 a630c5 _wcslen 95623->95626 95625 a233e8 95629 a26350 22 API calls 95625->95629 95627 a3fe0b 22 API calls 95626->95627 95628 a630fe __fread_nolock 95627->95628 95629->95584 95630->95591 95632 a635a4 95631->95632 95633 a238b7 95631->95633 95632->95633 95634 a635ad DestroyIcon 95632->95634 95633->95597 95657 a8c874 42 API calls _strftime 95633->95657 95634->95633 95636 a2393f 95635->95636 95655 a23a13 95635->95655 95658 a26270 95636->95658 95639 a63393 LoadStringW 95643 a633ad 95639->95643 95640 a2395a 95641 a26b57 22 API calls 95640->95641 95642 a2396f 95641->95642 95644 a2397c 95642->95644 95645 a633c9 95642->95645 95651 a23994 ___scrt_fastfail 95643->95651 95664 a2a8c7 22 API calls __fread_nolock 95643->95664 95644->95643 95647 a23986 95644->95647 95665 a26350 22 API calls 95645->95665 95663 a26350 22 API calls 95647->95663 95650 a633d7 95650->95651 95652 a233c6 22 API calls 95650->95652 95653 a239f9 Shell_NotifyIconW 95651->95653 95654 a633f9 95652->95654 95653->95655 95656 a233c6 22 API calls 95654->95656 95655->95602 95656->95651 95657->95597 95659 a3fe0b 22 API calls 95658->95659 95660 a26295 95659->95660 95661 a3fddb 22 API calls 95660->95661 95662 a2394d 95661->95662 95662->95639 95662->95640 95663->95651 95664->95651 95665->95650 95667 a233fe _wcslen 95666->95667 95668 a23411 95667->95668 95669 a6311d 95667->95669 95676 a2a587 95668->95676 95671 a3fddb 22 API calls 95669->95671 95672 a63127 95671->95672 95674 a3fe0b 22 API calls 95672->95674 95673 a2341e __fread_nolock 95673->95625 95675 a63157 __fread_nolock 95674->95675 95677 a2a59d 95676->95677 95680 a2a598 __fread_nolock 95676->95680 95678 a6f80f 95677->95678 95679 a3fe0b 22 API calls 95677->95679 95679->95680 95680->95673 95681 a62402 95684 a21410 95681->95684 95685 a2144f mciSendStringW 95684->95685 95686 a624b8 DestroyWindow 95684->95686 95687 a216c6 95685->95687 95688 a2146b 95685->95688 95699 a624c4 95686->95699 95687->95688 95690 a216d5 UnregisterHotKey 95687->95690 95689 a21479 95688->95689 95688->95699 95717 a2182e 95689->95717 95690->95687 95693 a62509 95698 a6252d 95693->95698 95700 a6251c FreeLibrary 95693->95700 95694 a624e2 FindClose 95694->95699 95695 a624d8 95695->95699 95723 a26246 CloseHandle 95695->95723 95697 a2148e 95697->95698 95706 a2149c 95697->95706 95701 a62541 VirtualFree 95698->95701 95708 a21509 95698->95708 95699->95693 95699->95694 95699->95695 95700->95693 95701->95698 95702 a214f8 CoUninitialize 95702->95708 95703 a21514 95705 a21524 95703->95705 95704 a62589 95710 a62598 messages 95704->95710 95724 a932eb 6 API calls messages 95704->95724 95721 a21944 VirtualFreeEx CloseHandle 95705->95721 95706->95702 95708->95703 95708->95704 95713 a62627 95710->95713 95725 a864d4 22 API calls messages 95710->95725 95711 a2153a 95711->95710 95714 a2161f 95711->95714 95713->95713 95714->95713 95722 a21876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95714->95722 95716 a216c1 95719 a2183b 95717->95719 95718 a21480 95718->95693 95718->95697 95719->95718 95726 a8702a 22 API calls 95719->95726 95721->95711 95722->95716 95723->95695 95724->95704 95725->95710 95726->95719 95727 a21044 95732 a210f3 95727->95732 95729 a2104a 95768 a400a3 29 API calls __onexit 95729->95768 95731 a21054 95769 a21398 95732->95769 95736 a2116a 95737 a2a961 22 API calls 95736->95737 95738 a21174 95737->95738 95739 a2a961 22 API calls 95738->95739 95740 a2117e 95739->95740 95741 a2a961 22 API calls 95740->95741 95742 a21188 95741->95742 95743 a2a961 22 API calls 95742->95743 95744 a211c6 95743->95744 95745 a2a961 22 API calls 95744->95745 95746 a21292 95745->95746 95779 a2171c 95746->95779 95750 a212c4 95751 a2a961 22 API calls 95750->95751 95752 a212ce 95751->95752 95800 a31940 95752->95800 95754 a212f9 95810 a21aab 95754->95810 95756 a21315 95757 a21325 GetStdHandle 95756->95757 95758 a62485 95757->95758 95759 a2137a 95757->95759 95758->95759 95760 a6248e 95758->95760 95763 a21387 OleInitialize 95759->95763 95761 a3fddb 22 API calls 95760->95761 95762 a62495 95761->95762 95817 a9011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95762->95817 95763->95729 95765 a6249e 95818 a90944 CreateThread 95765->95818 95767 a624aa CloseHandle 95767->95759 95768->95731 95819 a213f1 95769->95819 95772 a213f1 22 API calls 95773 a213d0 95772->95773 95774 a2a961 22 API calls 95773->95774 95775 a213dc 95774->95775 95776 a26b57 22 API calls 95775->95776 95777 a21129 95776->95777 95778 a21bc3 6 API calls 95777->95778 95778->95736 95780 a2a961 22 API calls 95779->95780 95781 a2172c 95780->95781 95782 a2a961 22 API calls 95781->95782 95783 a21734 95782->95783 95784 a2a961 22 API calls 95783->95784 95785 a2174f 95784->95785 95786 a3fddb 22 API calls 95785->95786 95787 a2129c 95786->95787 95788 a21b4a 95787->95788 95789 a21b58 95788->95789 95790 a2a961 22 API calls 95789->95790 95791 a21b63 95790->95791 95792 a2a961 22 API calls 95791->95792 95793 a21b6e 95792->95793 95794 a2a961 22 API calls 95793->95794 95795 a21b79 95794->95795 95796 a2a961 22 API calls 95795->95796 95797 a21b84 95796->95797 95798 a3fddb 22 API calls 95797->95798 95799 a21b96 RegisterWindowMessageW 95798->95799 95799->95750 95801 a31981 95800->95801 95802 a3195d 95800->95802 95826 a40242 5 API calls __Init_thread_wait 95801->95826 95809 a3196e 95802->95809 95828 a40242 5 API calls __Init_thread_wait 95802->95828 95805 a3198b 95805->95802 95827 a401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95805->95827 95806 a38727 95806->95809 95829 a401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95806->95829 95809->95754 95811 a21abb 95810->95811 95812 a6272d 95810->95812 95813 a3fddb 22 API calls 95811->95813 95830 a93209 23 API calls 95812->95830 95815 a21ac3 95813->95815 95815->95756 95816 a62738 95817->95765 95818->95767 95831 a9092a 28 API calls 95818->95831 95820 a2a961 22 API calls 95819->95820 95821 a213fc 95820->95821 95822 a2a961 22 API calls 95821->95822 95823 a21404 95822->95823 95824 a2a961 22 API calls 95823->95824 95825 a213c6 95824->95825 95825->95772 95826->95805 95827->95802 95828->95806 95829->95809 95830->95816 95832 a72a00 95838 a2d7b0 messages 95832->95838 95833 a2d9d5 95834 a2db11 PeekMessageW 95834->95838 95835 a2d807 GetInputState 95835->95834 95835->95838 95837 a71cbe TranslateAcceleratorW 95837->95838 95838->95833 95838->95834 95838->95835 95838->95837 95839 a2db8f PeekMessageW 95838->95839 95840 a2da04 timeGetTime 95838->95840 95841 a2db73 TranslateMessage DispatchMessageW 95838->95841 95842 a2dbaf Sleep 95838->95842 95843 a72b74 Sleep 95838->95843 95844 a72a51 95838->95844 95847 a71dda timeGetTime 95838->95847 95864 a2dd50 95838->95864 95871 a31310 95838->95871 95926 a2bf40 95838->95926 95984 a3edf6 95838->95984 95989 a2dfd0 348 API calls 3 library calls 95838->95989 95990 a3e551 timeGetTime 95838->95990 95992 a93a2a 23 API calls 95838->95992 95993 a2ec40 95838->95993 96017 a9359c 82 API calls __wsopen_s 95838->96017 95839->95838 95840->95838 95841->95839 95842->95838 95843->95844 95844->95833 95844->95838 95850 a72c0b GetExitCodeProcess 95844->95850 95853 ab29bf GetForegroundWindow 95844->95853 95855 a72ca9 Sleep 95844->95855 96018 aa5658 23 API calls 95844->96018 96019 a8e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95844->96019 96020 a3e551 timeGetTime 95844->96020 96021 a8d4dc CreateToolhelp32Snapshot Process32FirstW 95844->96021 95991 a3e300 23 API calls 95847->95991 95851 a72c37 CloseHandle 95850->95851 95852 a72c21 WaitForSingleObject 95850->95852 95851->95844 95852->95838 95852->95851 95853->95844 95855->95838 95865 a2dd83 95864->95865 95866 a2dd6f 95864->95866 96063 a9359c 82 API calls __wsopen_s 95865->96063 96031 a2d260 95866->96031 95868 a2dd7a 95868->95838 95870 a72f75 95870->95870 95872 a317b0 95871->95872 95873 a31376 95871->95873 96102 a40242 5 API calls __Init_thread_wait 95872->96102 95874 a31390 95873->95874 95875 a76331 95873->95875 95878 a31940 9 API calls 95874->95878 95879 a7633d 95875->95879 96116 aa709c 348 API calls 95875->96116 95877 a317ba 95881 a317fb 95877->95881 95883 a29cb3 22 API calls 95877->95883 95882 a313a0 95878->95882 95879->95838 95886 a76346 95881->95886 95888 a3182c 95881->95888 95884 a31940 9 API calls 95882->95884 95892 a317d4 95883->95892 95885 a313b6 95884->95885 95885->95881 95887 a313ec 95885->95887 96117 a9359c 82 API calls __wsopen_s 95886->96117 95887->95886 95912 a31408 __fread_nolock 95887->95912 96104 a2aceb 95888->96104 95891 a31839 96114 a3d217 348 API calls 95891->96114 96103 a401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95892->96103 95895 a7636e 96118 a9359c 82 API calls __wsopen_s 95895->96118 95896 a3152f 95898 a763d1 95896->95898 95899 a3153c 95896->95899 96120 aa5745 54 API calls _wcslen 95898->96120 95902 a31940 9 API calls 95899->95902 95900 a31872 96115 a3faeb 23 API calls 95900->96115 95904 a31549 95902->95904 95903 a3fddb 22 API calls 95903->95912 95908 a31940 9 API calls 95904->95908 95916 a315c7 messages 95904->95916 95905 a3fe0b 22 API calls 95905->95912 95907 a3171d 95907->95838 95911 a31563 95908->95911 95910 a2ec40 348 API calls 95910->95912 95911->95916 96121 a2a8c7 22 API calls __fread_nolock 95911->96121 95912->95891 95912->95895 95912->95896 95912->95903 95912->95905 95912->95910 95914 a763b2 95912->95914 95912->95916 95913 a31940 9 API calls 95913->95916 96119 a9359c 82 API calls __wsopen_s 95914->96119 95916->95900 95916->95913 95918 a3167b messages 95916->95918 96073 a95c5a 95916->96073 96078 aaab67 95916->96078 96081 aaa2ea 95916->96081 96086 ab1591 95916->96086 96089 a3f645 95916->96089 96096 aaabf7 95916->96096 96122 a9359c 82 API calls __wsopen_s 95916->96122 95918->95907 96101 a3ce17 22 API calls messages 95918->96101 96296 a2adf0 95926->96296 95928 a2bf9d 95929 a704b6 95928->95929 95930 a2bfa9 95928->95930 96314 a9359c 82 API calls __wsopen_s 95929->96314 95932 a704c6 95930->95932 95933 a2c01e 95930->95933 96315 a9359c 82 API calls __wsopen_s 95932->96315 96301 a2ac91 95933->96301 95937 a2c7da 95941 a3fe0b 22 API calls 95937->95941 95938 a87120 22 API calls 95980 a2c039 __fread_nolock messages 95938->95980 95949 a2c808 __fread_nolock 95941->95949 95944 a704f5 95946 a7055a 95944->95946 96316 a3d217 348 API calls 95944->96316 95969 a2c603 95946->95969 96317 a9359c 82 API calls __wsopen_s 95946->96317 95947 a3fddb 22 API calls 95947->95980 95948 a2ec40 348 API calls 95948->95980 95951 a3fe0b 22 API calls 95949->95951 95950 a7091a 96326 a93209 23 API calls 95950->96326 95981 a2c350 __fread_nolock messages 95951->95981 95952 a2af8a 22 API calls 95952->95980 95955 a708a5 95956 a2ec40 348 API calls 95955->95956 95958 a708cf 95956->95958 95958->95969 96324 a2a81b 41 API calls 95958->96324 95959 a70591 96318 a9359c 82 API calls __wsopen_s 95959->96318 95960 a708f6 96325 a9359c 82 API calls __wsopen_s 95960->96325 95965 a2aceb 23 API calls 95965->95980 95966 a2c237 95967 a2c253 95966->95967 96327 a2a8c7 22 API calls __fread_nolock 95966->96327 95970 a70976 95967->95970 95974 a2c297 messages 95967->95974 95969->95838 95972 a2aceb 23 API calls 95970->95972 95973 a709bf 95972->95973 95973->95969 96328 a9359c 82 API calls __wsopen_s 95973->96328 95974->95973 95975 a2aceb 23 API calls 95974->95975 95976 a2c335 95975->95976 95976->95973 95978 a2c342 95976->95978 95977 a2bbe0 40 API calls 95977->95980 96312 a2a704 22 API calls messages 95978->96312 95980->95937 95980->95938 95980->95944 95980->95946 95980->95947 95980->95948 95980->95949 95980->95950 95980->95952 95980->95955 95980->95959 95980->95960 95980->95965 95980->95966 95980->95969 95980->95973 95980->95977 95982 a3fe0b 22 API calls 95980->95982 96305 a2ad81 95980->96305 96319 a87099 22 API calls __fread_nolock 95980->96319 96320 aa5745 54 API calls _wcslen 95980->96320 96321 a3aa42 22 API calls messages 95980->96321 96322 a8f05c 40 API calls 95980->96322 96323 a2a993 41 API calls 95980->96323 95983 a2c3ac 95981->95983 96313 a3ce17 22 API calls messages 95981->96313 95982->95980 95983->95838 95985 a3ee09 95984->95985 95986 a3ee12 95984->95986 95985->95838 95986->95985 95987 a3ee36 IsDialogMessageW 95986->95987 95988 a7efaf GetClassLongW 95986->95988 95987->95985 95987->95986 95988->95986 95988->95987 95989->95838 95990->95838 95991->95838 95992->95838 95995 a2ec76 messages 95993->95995 95994 a400a3 29 API calls pre_c_initialization 95994->95995 95995->95994 95996 a3fddb 22 API calls 95995->95996 95997 a2fef7 95995->95997 96000 a74600 95995->96000 96001 a74b0b 95995->96001 96002 a2a8c7 22 API calls 95995->96002 96008 a40242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95995->96008 96009 a2fbe3 95995->96009 96010 a2ed9d messages 95995->96010 96011 a2a961 22 API calls 95995->96011 96014 a74beb 95995->96014 96015 a401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95995->96015 96016 a2f3ae messages 95995->96016 96338 a301e0 348 API calls 2 library calls 95995->96338 96339 a306a0 41 API calls messages 95995->96339 95996->95995 95997->96010 96341 a2a8c7 22 API calls __fread_nolock 95997->96341 96000->96010 96340 a2a8c7 22 API calls __fread_nolock 96000->96340 96343 a9359c 82 API calls __wsopen_s 96001->96343 96002->95995 96008->95995 96009->96010 96012 a74bdc 96009->96012 96009->96016 96010->95838 96011->95995 96344 a9359c 82 API calls __wsopen_s 96012->96344 96345 a9359c 82 API calls __wsopen_s 96014->96345 96015->95995 96016->96010 96342 a9359c 82 API calls __wsopen_s 96016->96342 96017->95838 96018->95844 96019->95844 96020->95844 96346 a8def7 96021->96346 96023 a8d529 Process32NextW 96024 a8d5db CloseHandle 96023->96024 96029 a8d522 96023->96029 96024->95844 96025 a2a961 22 API calls 96025->96029 96026 a29cb3 22 API calls 96026->96029 96029->96023 96029->96024 96029->96025 96029->96026 96352 a2525f 22 API calls 96029->96352 96353 a26350 22 API calls 96029->96353 96354 a3ce60 41 API calls 96029->96354 96032 a2ec40 348 API calls 96031->96032 96050 a2d29d 96032->96050 96033 a71bc4 96072 a9359c 82 API calls __wsopen_s 96033->96072 96035 a2d30b messages 96035->95868 96036 a2d6d5 96036->96035 96047 a3fe0b 22 API calls 96036->96047 96037 a2d3c3 96037->96036 96039 a2d3ce 96037->96039 96038 a2d5ff 96042 a71bb5 96038->96042 96043 a2d614 96038->96043 96041 a3fddb 22 API calls 96039->96041 96040 a2d4b8 96049 a3fe0b 22 API calls 96040->96049 96052 a2d3d5 __fread_nolock 96041->96052 96071 aa5705 23 API calls 96042->96071 96045 a3fddb 22 API calls 96043->96045 96048 a2d46a 96045->96048 96046 a3fddb 22 API calls 96046->96050 96047->96052 96048->95868 96058 a2d429 __fread_nolock messages 96049->96058 96050->96033 96050->96035 96050->96036 96050->96037 96050->96040 96050->96046 96050->96058 96051 a3fddb 22 API calls 96053 a2d3f6 96051->96053 96052->96051 96052->96053 96053->96058 96064 a2bec0 348 API calls 96053->96064 96055 a71ba4 96070 a9359c 82 API calls __wsopen_s 96055->96070 96058->96038 96058->96048 96058->96055 96059 a71b7f 96058->96059 96061 a71b5d 96058->96061 96065 a21f6f 96058->96065 96069 a9359c 82 API calls __wsopen_s 96059->96069 96068 a9359c 82 API calls __wsopen_s 96061->96068 96063->95870 96064->96058 96066 a2ec40 348 API calls 96065->96066 96067 a21f98 96066->96067 96067->96058 96068->96048 96069->96048 96070->96048 96071->96033 96072->96035 96123 a27510 96073->96123 96077 a95c77 96077->95916 96155 aaaff9 96078->96155 96082 a27510 53 API calls 96081->96082 96083 aaa306 96082->96083 96084 a8d4dc 47 API calls 96083->96084 96085 aaa315 96084->96085 96085->95916 96283 ab2ad8 96086->96283 96088 ab159f 96088->95916 96090 a2b567 39 API calls 96089->96090 96091 a3f659 96090->96091 96092 a3f661 timeGetTime 96091->96092 96093 a7f2dc Sleep 96091->96093 96094 a2b567 39 API calls 96092->96094 96095 a3f677 96094->96095 96095->95916 96097 aaaff9 217 API calls 96096->96097 96099 aaac0c 96097->96099 96098 aaac54 96098->95916 96099->96098 96100 a2aceb 23 API calls 96099->96100 96100->96098 96101->95918 96102->95877 96103->95881 96105 a2acf9 96104->96105 96109 a2ad2a messages 96104->96109 96106 a2ad55 96105->96106 96108 a2ad01 messages 96105->96108 96106->96109 96294 a2a8c7 22 API calls __fread_nolock 96106->96294 96108->96109 96110 a2ad21 96108->96110 96111 a6fa48 96108->96111 96109->95891 96110->96109 96112 a6fa3a VariantClear 96110->96112 96111->96109 96295 a3ce17 22 API calls messages 96111->96295 96112->96109 96114->95900 96115->95900 96116->95879 96117->95916 96118->95916 96119->95916 96120->95911 96121->95916 96122->95916 96124 a27525 96123->96124 96141 a27522 96123->96141 96125 a2755b 96124->96125 96126 a2752d 96124->96126 96128 a650f6 96125->96128 96131 a2756d 96125->96131 96136 a6500f 96125->96136 96151 a451c6 26 API calls 96126->96151 96154 a45183 26 API calls 96128->96154 96129 a2753d 96135 a3fddb 22 API calls 96129->96135 96152 a3fb21 51 API calls 96131->96152 96132 a6510e 96132->96132 96137 a27547 96135->96137 96138 a65088 96136->96138 96140 a3fe0b 22 API calls 96136->96140 96139 a29cb3 22 API calls 96137->96139 96153 a3fb21 51 API calls 96138->96153 96139->96141 96142 a65058 96140->96142 96146 a8dbbe lstrlenW 96141->96146 96143 a3fddb 22 API calls 96142->96143 96144 a6507f 96143->96144 96145 a29cb3 22 API calls 96144->96145 96145->96138 96147 a8dbdc GetFileAttributesW 96146->96147 96148 a8dc06 96146->96148 96147->96148 96149 a8dbe8 FindFirstFileW 96147->96149 96148->96077 96149->96148 96150 a8dbf9 FindClose 96149->96150 96150->96148 96151->96129 96152->96129 96153->96128 96154->96132 96156 aab01d ___scrt_fastfail 96155->96156 96157 aab058 96156->96157 96158 aab094 96156->96158 96253 a2b567 96157->96253 96162 a2b567 39 API calls 96158->96162 96163 aab08b 96158->96163 96160 aab063 96160->96163 96166 a2b567 39 API calls 96160->96166 96161 aab0ed 96164 a27510 53 API calls 96161->96164 96165 aab0a5 96162->96165 96163->96161 96167 a2b567 39 API calls 96163->96167 96168 aab10b 96164->96168 96169 a2b567 39 API calls 96165->96169 96170 aab078 96166->96170 96167->96161 96246 a27620 96168->96246 96169->96163 96172 a2b567 39 API calls 96170->96172 96172->96163 96173 aab115 96174 aab1d8 96173->96174 96175 aab11f 96173->96175 96177 aab20a GetCurrentDirectoryW 96174->96177 96180 a27510 53 API calls 96174->96180 96176 a27510 53 API calls 96175->96176 96178 aab130 96176->96178 96179 a3fe0b 22 API calls 96177->96179 96181 a27620 22 API calls 96178->96181 96182 aab22f GetCurrentDirectoryW 96179->96182 96183 aab1ef 96180->96183 96184 aab13a 96181->96184 96185 aab23c 96182->96185 96186 a27620 22 API calls 96183->96186 96187 a27510 53 API calls 96184->96187 96190 aab275 96185->96190 96258 a29c6e 22 API calls 96185->96258 96188 aab1f9 _wcslen 96186->96188 96189 aab14b 96187->96189 96188->96177 96188->96190 96191 a27620 22 API calls 96189->96191 96197 aab28b 96190->96197 96198 aab287 96190->96198 96193 aab155 96191->96193 96195 a27510 53 API calls 96193->96195 96194 aab255 96259 a29c6e 22 API calls 96194->96259 96200 aab166 96195->96200 96261 a907c0 10 API calls 96197->96261 96203 aab39a CreateProcessW 96198->96203 96204 aab2f8 96198->96204 96205 a27620 22 API calls 96200->96205 96201 aab265 96260 a29c6e 22 API calls 96201->96260 96202 aab294 96262 a906e6 10 API calls 96202->96262 96224 aab32f _wcslen 96203->96224 96264 a811c8 39 API calls 96204->96264 96209 aab170 96205->96209 96212 aab1a6 GetSystemDirectoryW 96209->96212 96217 a27510 53 API calls 96209->96217 96210 aab2aa 96263 a905a7 8 API calls 96210->96263 96211 aab2fd 96215 aab32a 96211->96215 96216 aab323 96211->96216 96214 a3fe0b 22 API calls 96212->96214 96220 aab1cb GetSystemDirectoryW 96214->96220 96266 a814ce 6 API calls 96215->96266 96265 a81201 128 API calls 2 library calls 96216->96265 96222 aab187 96217->96222 96219 aab2d0 96219->96198 96220->96185 96223 a27620 22 API calls 96222->96223 96229 aab191 _wcslen 96223->96229 96226 aab42f CloseHandle 96224->96226 96228 aab3d6 GetLastError 96224->96228 96225 aab328 96225->96224 96227 aab43f 96226->96227 96237 aab49a 96226->96237 96230 aab451 96227->96230 96231 aab446 CloseHandle 96227->96231 96236 aab41a 96228->96236 96229->96185 96229->96212 96234 aab458 CloseHandle 96230->96234 96235 aab463 96230->96235 96231->96230 96233 aab4a6 96233->96236 96234->96235 96238 aab46a CloseHandle 96235->96238 96239 aab475 96235->96239 96250 a90175 96236->96250 96237->96233 96242 aab4d2 CloseHandle 96237->96242 96238->96239 96267 a909d9 34 API calls 96239->96267 96242->96236 96244 aab486 96268 aab536 25 API calls 96244->96268 96247 a2762a _wcslen 96246->96247 96248 a3fe0b 22 API calls 96247->96248 96249 a2763f 96248->96249 96249->96173 96269 a9030f 96250->96269 96254 a2b578 96253->96254 96255 a2b57f 96253->96255 96254->96255 96282 a462d1 39 API calls 96254->96282 96255->96160 96257 a2b5c2 96257->96160 96258->96194 96259->96201 96260->96190 96261->96202 96262->96210 96263->96219 96264->96211 96265->96225 96266->96224 96267->96244 96268->96237 96270 a90329 96269->96270 96271 a90321 CloseHandle 96269->96271 96272 a9032e CloseHandle 96270->96272 96273 a90336 96270->96273 96271->96270 96272->96273 96274 a9033b CloseHandle 96273->96274 96275 a90343 96273->96275 96274->96275 96276 a90348 CloseHandle 96275->96276 96277 a90350 96275->96277 96276->96277 96278 a9035d 96277->96278 96279 a90355 CloseHandle 96277->96279 96280 a9017d 96278->96280 96281 a90362 CloseHandle 96278->96281 96279->96278 96280->95916 96281->96280 96282->96257 96284 a2aceb 23 API calls 96283->96284 96285 ab2af3 96284->96285 96286 ab2aff 96285->96286 96287 ab2b1d 96285->96287 96288 a27510 53 API calls 96286->96288 96289 a26b57 22 API calls 96287->96289 96290 ab2b0c 96288->96290 96292 ab2b1b 96289->96292 96290->96292 96293 a2a8c7 22 API calls __fread_nolock 96290->96293 96292->96088 96293->96292 96294->96109 96295->96109 96297 a2ae01 96296->96297 96300 a2ae1c messages 96296->96300 96298 a2aec9 22 API calls 96297->96298 96299 a2ae09 CharUpperBuffW 96298->96299 96299->96300 96300->95928 96302 a2acae 96301->96302 96303 a2acd1 96302->96303 96329 a9359c 82 API calls __wsopen_s 96302->96329 96303->95980 96306 a2ad92 96305->96306 96307 a6fadb 96305->96307 96308 a3fddb 22 API calls 96306->96308 96309 a2ad99 96308->96309 96330 a2adcd 96309->96330 96312->95981 96313->95981 96314->95932 96315->95969 96316->95946 96317->95969 96318->95969 96319->95980 96320->95980 96321->95980 96322->95980 96323->95980 96324->95960 96325->95969 96326->95966 96327->95967 96328->95969 96329->96303 96334 a2addd 96330->96334 96331 a2adb6 96331->95980 96332 a3fddb 22 API calls 96332->96334 96333 a2a961 22 API calls 96333->96334 96334->96331 96334->96332 96334->96333 96336 a2adcd 22 API calls 96334->96336 96337 a2a8c7 22 API calls __fread_nolock 96334->96337 96336->96334 96337->96334 96338->95995 96339->95995 96340->96010 96341->96010 96342->96010 96343->96010 96344->96014 96345->96010 96348 a8df02 96346->96348 96347 a8df19 96356 a462fb 39 API calls 96347->96356 96348->96347 96351 a8df1f 96348->96351 96355 a463b2 GetStringTypeW _strftime 96348->96355 96351->96029 96352->96029 96353->96029 96354->96029 96355->96348 96356->96351 96357 a58402 96362 a581be 96357->96362 96360 a5842a 96367 a581ef try_get_first_available_module 96362->96367 96364 a583ee 96381 a527ec 26 API calls ___std_exception_copy 96364->96381 96366 a58343 96366->96360 96374 a60984 96366->96374 96370 a58338 96367->96370 96377 a48e0b 40 API calls 2 library calls 96367->96377 96369 a5838c 96369->96370 96378 a48e0b 40 API calls 2 library calls 96369->96378 96370->96366 96380 a4f2d9 20 API calls _abort 96370->96380 96372 a583ab 96372->96370 96379 a48e0b 40 API calls 2 library calls 96372->96379 96382 a60081 96374->96382 96376 a6099f 96376->96360 96377->96369 96378->96372 96379->96370 96380->96364 96381->96366 96385 a6008d ___DestructExceptionObject 96382->96385 96383 a6009b 96439 a4f2d9 20 API calls _abort 96383->96439 96385->96383 96387 a600d4 96385->96387 96386 a600a0 96440 a527ec 26 API calls ___std_exception_copy 96386->96440 96393 a6065b 96387->96393 96392 a600aa __wsopen_s 96392->96376 96394 a60678 96393->96394 96395 a606a6 96394->96395 96396 a6068d 96394->96396 96442 a55221 96395->96442 96456 a4f2c6 20 API calls _abort 96396->96456 96399 a60692 96457 a4f2d9 20 API calls _abort 96399->96457 96400 a606ab 96401 a606b4 96400->96401 96402 a606cb 96400->96402 96458 a4f2c6 20 API calls _abort 96401->96458 96455 a6039a CreateFileW 96402->96455 96406 a606b9 96459 a4f2d9 20 API calls _abort 96406->96459 96408 a60781 GetFileType 96410 a607d3 96408->96410 96411 a6078c GetLastError 96408->96411 96409 a60756 GetLastError 96461 a4f2a3 20 API calls 2 library calls 96409->96461 96464 a5516a 21 API calls 3 library calls 96410->96464 96462 a4f2a3 20 API calls 2 library calls 96411->96462 96413 a60704 96413->96408 96413->96409 96460 a6039a CreateFileW 96413->96460 96415 a6079a CloseHandle 96415->96399 96417 a607c3 96415->96417 96463 a4f2d9 20 API calls _abort 96417->96463 96419 a60749 96419->96408 96419->96409 96421 a607f4 96423 a60840 96421->96423 96465 a605ab 72 API calls 4 library calls 96421->96465 96422 a607c8 96422->96399 96427 a6086d 96423->96427 96466 a6014d 72 API calls 4 library calls 96423->96466 96426 a60866 96426->96427 96429 a6087e 96426->96429 96428 a586ae __wsopen_s 29 API calls 96427->96428 96430 a600f8 96428->96430 96429->96430 96431 a608fc CloseHandle 96429->96431 96441 a60121 LeaveCriticalSection __wsopen_s 96430->96441 96467 a6039a CreateFileW 96431->96467 96433 a60927 96434 a6095d 96433->96434 96435 a60931 GetLastError 96433->96435 96434->96430 96468 a4f2a3 20 API calls 2 library calls 96435->96468 96437 a6093d 96469 a55333 21 API calls 3 library calls 96437->96469 96439->96386 96440->96392 96441->96392 96443 a5522d ___DestructExceptionObject 96442->96443 96470 a52f5e EnterCriticalSection 96443->96470 96445 a55234 96447 a55259 96445->96447 96451 a552c7 EnterCriticalSection 96445->96451 96452 a5527b 96445->96452 96474 a55000 96447->96474 96449 a552a4 __wsopen_s 96449->96400 96451->96452 96453 a552d4 LeaveCriticalSection 96451->96453 96471 a5532a 96452->96471 96453->96445 96455->96413 96456->96399 96457->96430 96458->96406 96459->96399 96460->96419 96461->96399 96462->96415 96463->96422 96464->96421 96465->96423 96466->96426 96467->96433 96468->96437 96469->96434 96470->96445 96482 a52fa6 LeaveCriticalSection 96471->96482 96473 a55331 96473->96449 96475 a54c7d _abort 20 API calls 96474->96475 96476 a55012 96475->96476 96480 a5501f 96476->96480 96483 a53405 11 API calls 2 library calls 96476->96483 96477 a529c8 _free 20 API calls 96479 a55071 96477->96479 96479->96452 96481 a55147 EnterCriticalSection 96479->96481 96480->96477 96481->96452 96482->96473 96483->96476 96484 a21cad SystemParametersInfoW 96485 a21033 96490 a24c91 96485->96490 96489 a21042 96491 a2a961 22 API calls 96490->96491 96492 a24cff 96491->96492 96498 a23af0 96492->96498 96495 a24d9c 96496 a21038 96495->96496 96501 a251f7 22 API calls __fread_nolock 96495->96501 96497 a400a3 29 API calls __onexit 96496->96497 96497->96489 96502 a23b1c 96498->96502 96501->96495 96503 a23b0f 96502->96503 96504 a23b29 96502->96504 96503->96495 96504->96503 96505 a23b30 RegOpenKeyExW 96504->96505 96505->96503 96506 a23b4a RegQueryValueExW 96505->96506 96507 a23b80 RegCloseKey 96506->96507 96508 a23b6b 96506->96508 96507->96503 96508->96507 96509 a73f75 96520 a3ceb1 96509->96520 96511 a73f8b 96513 a74006 96511->96513 96529 a3e300 23 API calls 96511->96529 96515 a2bf40 348 API calls 96513->96515 96514 a73fe6 96517 a74052 96514->96517 96530 a91abf 22 API calls 96514->96530 96515->96517 96518 a74a88 96517->96518 96531 a9359c 82 API calls __wsopen_s 96517->96531 96521 a3ced2 96520->96521 96522 a3cebf 96520->96522 96524 a3ced7 96521->96524 96525 a3cf05 96521->96525 96523 a2aceb 23 API calls 96522->96523 96528 a3cec9 96523->96528 96526 a3fddb 22 API calls 96524->96526 96527 a2aceb 23 API calls 96525->96527 96526->96528 96527->96528 96528->96511 96529->96514 96530->96513 96531->96518 96532 a23156 96535 a23170 96532->96535 96536 a23187 96535->96536 96537 a231eb 96536->96537 96538 a2318c 96536->96538 96539 a231e9 96536->96539 96543 a231f1 96537->96543 96544 a62dfb 96537->96544 96540 a23265 PostQuitMessage 96538->96540 96541 a23199 96538->96541 96542 a231d0 DefWindowProcW 96539->96542 96548 a2316a 96540->96548 96546 a231a4 96541->96546 96547 a62e7c 96541->96547 96542->96548 96549 a231f8 96543->96549 96550 a2321d SetTimer RegisterWindowMessageW 96543->96550 96590 a218e2 10 API calls 96544->96590 96552 a231ae 96546->96552 96553 a62e68 96546->96553 96593 a8bf30 34 API calls ___scrt_fastfail 96547->96593 96556 a23201 KillTimer 96549->96556 96557 a62d9c 96549->96557 96550->96548 96554 a23246 CreatePopupMenu 96550->96554 96551 a62e1c 96591 a3e499 42 API calls 96551->96591 96560 a62e4d 96552->96560 96561 a231b9 96552->96561 96580 a8c161 96553->96580 96554->96548 96565 a230f2 Shell_NotifyIconW 96556->96565 96563 a62dd7 MoveWindow 96557->96563 96564 a62da1 96557->96564 96560->96542 96592 a80ad7 22 API calls 96560->96592 96566 a231c4 96561->96566 96567 a23253 96561->96567 96562 a62e8e 96562->96542 96562->96548 96563->96548 96568 a62dc6 SetFocus 96564->96568 96569 a62da7 96564->96569 96570 a23214 96565->96570 96566->96542 96577 a230f2 Shell_NotifyIconW 96566->96577 96588 a2326f 44 API calls ___scrt_fastfail 96567->96588 96568->96548 96569->96566 96573 a62db0 96569->96573 96587 a23c50 DeleteObject DestroyWindow 96570->96587 96589 a218e2 10 API calls 96573->96589 96575 a23263 96575->96548 96578 a62e41 96577->96578 96579 a23837 49 API calls 96578->96579 96579->96539 96581 a8c179 ___scrt_fastfail 96580->96581 96582 a8c276 96580->96582 96583 a23923 24 API calls 96581->96583 96582->96548 96585 a8c1a0 96583->96585 96584 a8c25f KillTimer SetTimer 96584->96582 96585->96584 96586 a8c251 Shell_NotifyIconW 96585->96586 96586->96584 96587->96548 96588->96575 96589->96548 96590->96551 96591->96566 96592->96539 96593->96562 96594 a22e37 96595 a2a961 22 API calls 96594->96595 96596 a22e4d 96595->96596 96673 a24ae3 96596->96673 96598 a22e6b 96599 a23a5a 24 API calls 96598->96599 96600 a22e7f 96599->96600 96601 a29cb3 22 API calls 96600->96601 96602 a22e8c 96601->96602 96603 a24ecb 94 API calls 96602->96603 96604 a22ea5 96603->96604 96605 a62cb0 96604->96605 96606 a22ead 96604->96606 96607 a92cf9 80 API calls 96605->96607 96687 a2a8c7 22 API calls __fread_nolock 96606->96687 96608 a62cc3 96607->96608 96610 a62ccf 96608->96610 96612 a24f39 68 API calls 96608->96612 96614 a24f39 68 API calls 96610->96614 96611 a22ec3 96688 a26f88 22 API calls 96611->96688 96612->96610 96616 a62ce5 96614->96616 96615 a22ecf 96617 a29cb3 22 API calls 96615->96617 96705 a23084 22 API calls 96616->96705 96618 a22edc 96617->96618 96689 a2a81b 41 API calls 96618->96689 96621 a22eec 96623 a29cb3 22 API calls 96621->96623 96622 a62d02 96706 a23084 22 API calls 96622->96706 96625 a22f12 96623->96625 96690 a2a81b 41 API calls 96625->96690 96626 a62d1e 96628 a23a5a 24 API calls 96626->96628 96630 a62d44 96628->96630 96629 a22f21 96633 a2a961 22 API calls 96629->96633 96707 a23084 22 API calls 96630->96707 96632 a62d50 96708 a2a8c7 22 API calls __fread_nolock 96632->96708 96635 a22f3f 96633->96635 96691 a23084 22 API calls 96635->96691 96636 a62d5e 96709 a23084 22 API calls 96636->96709 96639 a22f4b 96692 a44a28 40 API calls 3 library calls 96639->96692 96640 a62d6d 96710 a2a8c7 22 API calls __fread_nolock 96640->96710 96642 a22f59 96642->96616 96643 a22f63 96642->96643 96693 a44a28 40 API calls 3 library calls 96643->96693 96646 a62d83 96711 a23084 22 API calls 96646->96711 96647 a22f6e 96647->96622 96649 a22f78 96647->96649 96694 a44a28 40 API calls 3 library calls 96649->96694 96650 a62d90 96652 a22f83 96652->96626 96653 a22f8d 96652->96653 96695 a44a28 40 API calls 3 library calls 96653->96695 96655 a22f98 96656 a22fdc 96655->96656 96696 a23084 22 API calls 96655->96696 96656->96640 96657 a22fe8 96656->96657 96657->96650 96699 a263eb 22 API calls 96657->96699 96659 a22fbf 96697 a2a8c7 22 API calls __fread_nolock 96659->96697 96661 a22ff8 96700 a26a50 22 API calls 96661->96700 96664 a22fcd 96698 a23084 22 API calls 96664->96698 96665 a23006 96701 a270b0 23 API calls 96665->96701 96670 a23021 96671 a23065 96670->96671 96702 a26f88 22 API calls 96670->96702 96703 a270b0 23 API calls 96670->96703 96704 a23084 22 API calls 96670->96704 96674 a24af0 __wsopen_s 96673->96674 96675 a26b57 22 API calls 96674->96675 96676 a24b22 96674->96676 96675->96676 96686 a24b58 96676->96686 96712 a24c6d 96676->96712 96678 a29cb3 22 API calls 96680 a24c52 96678->96680 96679 a29cb3 22 API calls 96679->96686 96681 a2515f 22 API calls 96680->96681 96684 a24c5e 96681->96684 96682 a24c6d 22 API calls 96682->96686 96683 a2515f 22 API calls 96683->96686 96684->96598 96685 a24c29 96685->96678 96685->96684 96686->96679 96686->96682 96686->96683 96686->96685 96687->96611 96688->96615 96689->96621 96690->96629 96691->96639 96692->96642 96693->96647 96694->96652 96695->96655 96696->96659 96697->96664 96698->96656 96699->96661 96700->96665 96701->96670 96702->96670 96703->96670 96704->96670 96705->96622 96706->96626 96707->96632 96708->96636 96709->96640 96710->96646 96711->96650 96713 a2aec9 22 API calls 96712->96713 96714 a24c78 96713->96714 96714->96676 96715 a2105b 96720 a2344d 96715->96720 96717 a2106a 96751 a400a3 29 API calls __onexit 96717->96751 96719 a21074 96721 a2345d __wsopen_s 96720->96721 96722 a2a961 22 API calls 96721->96722 96723 a23513 96722->96723 96724 a23a5a 24 API calls 96723->96724 96725 a2351c 96724->96725 96752 a23357 96725->96752 96728 a233c6 22 API calls 96729 a23535 96728->96729 96730 a2515f 22 API calls 96729->96730 96731 a23544 96730->96731 96732 a2a961 22 API calls 96731->96732 96733 a2354d 96732->96733 96734 a2a6c3 22 API calls 96733->96734 96735 a23556 RegOpenKeyExW 96734->96735 96736 a63176 RegQueryValueExW 96735->96736 96740 a23578 96735->96740 96737 a63193 96736->96737 96738 a6320c RegCloseKey 96736->96738 96739 a3fe0b 22 API calls 96737->96739 96738->96740 96750 a6321e _wcslen 96738->96750 96741 a631ac 96739->96741 96740->96717 96743 a25722 22 API calls 96741->96743 96742 a24c6d 22 API calls 96742->96750 96744 a631b7 RegQueryValueExW 96743->96744 96745 a631d4 96744->96745 96747 a631ee messages 96744->96747 96746 a26b57 22 API calls 96745->96746 96746->96747 96747->96738 96748 a29cb3 22 API calls 96748->96750 96749 a2515f 22 API calls 96749->96750 96750->96740 96750->96742 96750->96748 96750->96749 96751->96719 96753 a61f50 __wsopen_s 96752->96753 96754 a23364 GetFullPathNameW 96753->96754 96755 a23386 96754->96755 96756 a26b57 22 API calls 96755->96756 96757 a233a4 96756->96757 96757->96728 96758 a21098 96763 a242de 96758->96763 96762 a210a7 96764 a2a961 22 API calls 96763->96764 96765 a242f5 GetVersionExW 96764->96765 96766 a26b57 22 API calls 96765->96766 96767 a24342 96766->96767 96768 a293b2 22 API calls 96767->96768 96777 a24378 96767->96777 96769 a2436c 96768->96769 96771 a237a0 22 API calls 96769->96771 96770 a2441b GetCurrentProcess IsWow64Process 96772 a24437 96770->96772 96771->96777 96773 a63824 GetSystemInfo 96772->96773 96774 a2444f LoadLibraryA 96772->96774 96775 a24460 GetProcAddress 96774->96775 96776 a2449c GetSystemInfo 96774->96776 96775->96776 96779 a24470 GetNativeSystemInfo 96775->96779 96780 a24476 96776->96780 96777->96770 96778 a637df 96777->96778 96779->96780 96781 a2109d 96780->96781 96782 a2447a FreeLibrary 96780->96782 96783 a400a3 29 API calls __onexit 96781->96783 96782->96781 96783->96762 96784 a2f7bf 96785 a2f7d3 96784->96785 96786 a2fcb6 96784->96786 96788 a2fcc2 96785->96788 96789 a3fddb 22 API calls 96785->96789 96787 a2aceb 23 API calls 96786->96787 96787->96788 96790 a2aceb 23 API calls 96788->96790 96791 a2f7e5 96789->96791 96793 a2fd3d 96790->96793 96791->96788 96792 a2f83e 96791->96792 96791->96793 96795 a31310 348 API calls 96792->96795 96809 a2ed9d messages 96792->96809 96821 a91155 22 API calls 96793->96821 96801 a2ec76 messages 96795->96801 96796 a74beb 96827 a9359c 82 API calls __wsopen_s 96796->96827 96797 a3fddb 22 API calls 96797->96801 96798 a2fef7 96798->96809 96823 a2a8c7 22 API calls __fread_nolock 96798->96823 96801->96796 96801->96797 96801->96798 96802 a74600 96801->96802 96803 a74b0b 96801->96803 96804 a2a8c7 22 API calls 96801->96804 96801->96809 96811 a2fbe3 96801->96811 96812 a2a961 22 API calls 96801->96812 96815 a40242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96801->96815 96816 a401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96801->96816 96817 a400a3 29 API calls pre_c_initialization 96801->96817 96818 a2f3ae messages 96801->96818 96819 a301e0 348 API calls 2 library calls 96801->96819 96820 a306a0 41 API calls messages 96801->96820 96802->96809 96822 a2a8c7 22 API calls __fread_nolock 96802->96822 96825 a9359c 82 API calls __wsopen_s 96803->96825 96804->96801 96811->96809 96813 a74bdc 96811->96813 96811->96818 96812->96801 96826 a9359c 82 API calls __wsopen_s 96813->96826 96815->96801 96816->96801 96817->96801 96818->96809 96824 a9359c 82 API calls __wsopen_s 96818->96824 96819->96801 96820->96801 96821->96809 96822->96809 96823->96809 96824->96809 96825->96809 96826->96796 96827->96809 96828 a2defc 96831 a21d6f 96828->96831 96830 a2df07 96832 a21d8c 96831->96832 96833 a21f6f 348 API calls 96832->96833 96834 a21da6 96833->96834 96835 a62759 96834->96835 96837 a21e36 96834->96837 96838 a21dc2 96834->96838 96841 a9359c 82 API calls __wsopen_s 96835->96841 96837->96830 96838->96837 96840 a2289a 23 API calls 96838->96840 96840->96837 96841->96837 96842 ab2a55 96850 a91ebc 96842->96850 96845 ab2a87 96846 ab2a70 96852 a839c0 22 API calls 96846->96852 96848 ab2a7c 96853 a8417d 22 API calls __fread_nolock 96848->96853 96851 a91ec3 IsWindow 96850->96851 96851->96845 96851->96846 96852->96848 96853->96845 96854 a403fb 96855 a40407 ___DestructExceptionObject 96854->96855 96883 a3feb1 96855->96883 96857 a4040e 96858 a40561 96857->96858 96861 a40438 96857->96861 96913 a4083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96858->96913 96860 a40568 96906 a44e52 96860->96906 96872 a40477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96861->96872 96894 a5247d 96861->96894 96867 a40457 96870 a404d8 96902 a40959 96870->96902 96872->96870 96909 a44e1a 38 API calls 2 library calls 96872->96909 96874 a404de 96875 a404f3 96874->96875 96910 a40992 GetModuleHandleW 96875->96910 96877 a404fa 96877->96860 96878 a404fe 96877->96878 96879 a40507 96878->96879 96911 a44df5 28 API calls _abort 96878->96911 96912 a40040 13 API calls 2 library calls 96879->96912 96882 a4050f 96882->96867 96884 a3feba 96883->96884 96915 a40698 IsProcessorFeaturePresent 96884->96915 96886 a3fec6 96916 a42c94 10 API calls 3 library calls 96886->96916 96888 a3fecb 96893 a3fecf 96888->96893 96917 a52317 96888->96917 96891 a3fee6 96891->96857 96893->96857 96895 a52494 96894->96895 96896 a40a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96895->96896 96897 a40451 96896->96897 96897->96867 96898 a52421 96897->96898 96899 a52450 96898->96899 96900 a40a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96899->96900 96901 a52479 96900->96901 96901->96872 96968 a42340 96902->96968 96905 a4097f 96905->96874 96970 a44bcf 96906->96970 96909->96870 96910->96877 96911->96879 96912->96882 96913->96860 96915->96886 96916->96888 96921 a5d1f6 96917->96921 96920 a42cbd 8 API calls 3 library calls 96920->96893 96922 a5d213 96921->96922 96925 a5d20f 96921->96925 96922->96925 96927 a54bfb 96922->96927 96924 a3fed8 96924->96891 96924->96920 96939 a40a8c 96925->96939 96928 a54c07 ___DestructExceptionObject 96927->96928 96946 a52f5e EnterCriticalSection 96928->96946 96930 a54c0e 96947 a550af 96930->96947 96932 a54c1d 96938 a54c2c 96932->96938 96960 a54a8f 29 API calls 96932->96960 96935 a54c3d __wsopen_s 96935->96922 96936 a54c27 96961 a54b45 GetStdHandle GetFileType 96936->96961 96962 a54c48 LeaveCriticalSection _abort 96938->96962 96940 a40a95 96939->96940 96941 a40a97 IsProcessorFeaturePresent 96939->96941 96940->96924 96943 a40c5d 96941->96943 96967 a40c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96943->96967 96945 a40d40 96945->96924 96946->96930 96948 a550bb ___DestructExceptionObject 96947->96948 96949 a550df 96948->96949 96950 a550c8 96948->96950 96963 a52f5e EnterCriticalSection 96949->96963 96964 a4f2d9 20 API calls _abort 96950->96964 96953 a550cd 96965 a527ec 26 API calls ___std_exception_copy 96953->96965 96956 a550d7 __wsopen_s 96956->96932 96957 a55000 __wsopen_s 21 API calls 96959 a550eb 96957->96959 96958 a55117 96966 a5513e LeaveCriticalSection _abort 96958->96966 96959->96957 96959->96958 96960->96936 96961->96938 96962->96935 96963->96959 96964->96953 96965->96956 96966->96956 96967->96945 96969 a4096c GetStartupInfoW 96968->96969 96969->96905 96971 a44bdb _abort 96970->96971 96972 a44bf4 96971->96972 96973 a44be2 96971->96973 96994 a52f5e EnterCriticalSection 96972->96994 97009 a44d29 GetModuleHandleW 96973->97009 96976 a44be7 96976->96972 97010 a44d6d GetModuleHandleExW 96976->97010 96977 a44c99 96998 a44cd9 96977->96998 96981 a44c70 96986 a44c88 96981->96986 96991 a52421 _abort 5 API calls 96981->96991 96983 a44bfb 96983->96977 96983->96981 96995 a521a8 96983->96995 96984 a44cb6 97001 a44ce8 96984->97001 96985 a44ce2 97018 a61d29 5 API calls __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 96985->97018 96987 a52421 _abort 5 API calls 96986->96987 96987->96977 96991->96986 96994->96983 97019 a51ee1 96995->97019 97038 a52fa6 LeaveCriticalSection 96998->97038 97000 a44cb2 97000->96984 97000->96985 97039 a5360c 97001->97039 97004 a44d16 97007 a44d6d _abort 8 API calls 97004->97007 97005 a44cf6 GetPEB 97005->97004 97006 a44d06 GetCurrentProcess TerminateProcess 97005->97006 97006->97004 97008 a44d1e ExitProcess 97007->97008 97009->96976 97011 a44d97 GetProcAddress 97010->97011 97012 a44dba 97010->97012 97013 a44dac 97011->97013 97014 a44dc0 FreeLibrary 97012->97014 97015 a44dc9 97012->97015 97013->97012 97014->97015 97016 a40a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97015->97016 97017 a44bf3 97016->97017 97017->96972 97022 a51e90 97019->97022 97021 a51f05 97021->96981 97023 a51e9c ___DestructExceptionObject 97022->97023 97030 a52f5e EnterCriticalSection 97023->97030 97025 a51eaa 97031 a51f31 97025->97031 97029 a51ec8 __wsopen_s 97029->97021 97030->97025 97032 a51f51 97031->97032 97035 a51f59 97031->97035 97033 a40a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97032->97033 97034 a51eb7 97033->97034 97037 a51ed5 LeaveCriticalSection _abort 97034->97037 97035->97032 97036 a529c8 _free 20 API calls 97035->97036 97036->97032 97037->97029 97038->97000 97040 a53627 97039->97040 97041 a53631 97039->97041 97043 a40a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97040->97043 97046 a52fd7 5 API calls 2 library calls 97041->97046 97044 a44cf2 97043->97044 97044->97004 97044->97005 97045 a53648 97045->97040 97046->97045

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 389 a242de-a2434d call a2a961 GetVersionExW call a26b57 394 a63617-a6362a 389->394 395 a24353 389->395 397 a6362b-a6362f 394->397 396 a24355-a24357 395->396 400 a63656 396->400 401 a2435d-a243bc call a293b2 call a237a0 396->401 398 a63632-a6363e 397->398 399 a63631 397->399 398->397 402 a63640-a63642 398->402 399->398 405 a6365d-a63660 400->405 418 a243c2-a243c4 401->418 419 a637df-a637e6 401->419 402->396 404 a63648-a6364f 402->404 404->394 407 a63651 404->407 408 a63666-a636a8 405->408 409 a2441b-a24435 GetCurrentProcess IsWow64Process 405->409 407->400 408->409 413 a636ae-a636b1 408->413 411 a24437 409->411 412 a24494-a2449a 409->412 415 a2443d-a24449 411->415 412->415 416 a636b3-a636bd 413->416 417 a636db-a636e5 413->417 420 a63824-a63828 GetSystemInfo 415->420 421 a2444f-a2445e LoadLibraryA 415->421 422 a636bf-a636c5 416->422 423 a636ca-a636d6 416->423 425 a636e7-a636f3 417->425 426 a636f8-a63702 417->426 418->405 424 a243ca-a243dd 418->424 427 a63806-a63809 419->427 428 a637e8 419->428 434 a24460-a2446e GetProcAddress 421->434 435 a2449c-a244a6 GetSystemInfo 421->435 422->409 423->409 436 a63726-a6372f 424->436 437 a243e3-a243e5 424->437 425->409 430 a63704-a63710 426->430 431 a63715-a63721 426->431 432 a637f4-a637fc 427->432 433 a6380b-a6381a 427->433 429 a637ee 428->429 429->432 430->409 431->409 432->427 433->429 442 a6381c-a63822 433->442 434->435 443 a24470-a24474 GetNativeSystemInfo 434->443 444 a24476-a24478 435->444 440 a63731-a63737 436->440 441 a6373c-a63748 436->441 438 a243eb-a243ee 437->438 439 a6374d-a63762 437->439 445 a243f4-a2440f 438->445 446 a63791-a63794 438->446 447 a63764-a6376a 439->447 448 a6376f-a6377b 439->448 440->409 441->409 442->432 443->444 449 a24481-a24493 444->449 450 a2447a-a2447b FreeLibrary 444->450 451 a63780-a6378c 445->451 452 a24415 445->452 446->409 453 a6379a-a637c1 446->453 447->409 448->409 450->449 451->409 452->409 454 a637c3-a637c9 453->454 455 a637ce-a637da 453->455 454->409 455->409
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetVersionExW.KERNEL32(?), ref: 00A2430D
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,00ABCB64,00000000,?,?), ref: 00A24422
                                                                                                                                                                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00A24429
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00A24454
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A24466
                                                                                                                                                                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00A24474
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 00A2447B
                                                                                                                                                                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 00A244A0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                    • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                    • Opcode ID: acd4754f4f5ca0f6b69a324a0780e3cadf9eb3ff36af0862b23f38e92bc9e2c7
                                                                                                                                                                                                                    • Instruction ID: fef92e3db9fe379646641dae03ce2b8e65c1234f4d2a09163fdf3e5f79165b54
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: acd4754f4f5ca0f6b69a324a0780e3cadf9eb3ff36af0862b23f38e92bc9e2c7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EFA1947690A2D4DFCB95D7EDBC815B97FF46B3A700B084BA9D0859FA22D230450BDB21

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 793 a242a2-a242ba CreateStreamOnHGlobal 794 a242da-a242dd 793->794 795 a242bc-a242d3 FindResourceExW 793->795 796 a242d9 795->796 797 a635ba-a635c9 LoadResource 795->797 796->794 797->796 798 a635cf-a635dd SizeofResource 797->798 798->796 799 a635e3-a635ee LockResource 798->799 799->796 800 a635f4-a63612 799->800 800->796
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00A250AA,?,?,00000000,00000000), ref: 00A242B2
                                                                                                                                                                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00A250AA,?,?,00000000,00000000), ref: 00A242C9
                                                                                                                                                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,00A250AA,?,?,00000000,00000000,?,?,?,?,?,?,00A24F20), ref: 00A635BE
                                                                                                                                                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,00A250AA,?,?,00000000,00000000,?,?,?,?,?,?,00A24F20), ref: 00A635D3
                                                                                                                                                                                                                    • LockResource.KERNEL32(00A250AA,?,?,00A250AA,?,?,00000000,00000000,?,?,?,?,?,?,00A24F20,?), ref: 00A635E6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                    • String ID: SCRIPT
                                                                                                                                                                                                                    • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                    • Opcode ID: 04624e51d62445ce3e587136fe8c05999cba7f14861dba59f11eebd253951597
                                                                                                                                                                                                                    • Instruction ID: 74d3a5ac3693c570448d7353b582bf05408ca1ab21fd619dec1713e363be1aa6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 04624e51d62445ce3e587136fe8c05999cba7f14861dba59f11eebd253951597
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64117C71200710FFDB219BAAEC48FA77BB9EBC9B61F104269B40296261DB71DC018630

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A22B6B
                                                                                                                                                                                                                      • Part of subcall function 00A23A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AF1418,?,00A22E7F,?,?,?,00000000), ref: 00A23A78
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00AE2224), ref: 00A62C10
                                                                                                                                                                                                                    • ShellExecuteW.SHELL32(00000000,?,?,00AE2224), ref: 00A62C17
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                    • String ID: runas
                                                                                                                                                                                                                    • API String ID: 448630720-4000483414
                                                                                                                                                                                                                    • Opcode ID: 7cfdbb7b176c4f21a889ef063586332095ae4170d48a111c9a107739fac5dd3a
                                                                                                                                                                                                                    • Instruction ID: 3674dcf178396a06624d604b1b3597590796f9f70a111db22e511559da4a70b5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7cfdbb7b176c4f21a889ef063586332095ae4170d48a111c9a107739fac5dd3a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09110632508355AACB04FFACF951EBE77A4ABD2710F44083CF182560A3CF258A0AD712

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00A8D501
                                                                                                                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00A8D50F
                                                                                                                                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00A8D52F
                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000), ref: 00A8D5DC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 420147892-0
                                                                                                                                                                                                                    • Opcode ID: 5debb00901952ee67ba559c4ae3cfbdfbe6ee86df528261c5c9c07b3409bdb12
                                                                                                                                                                                                                    • Instruction ID: 1db2895212794eccc8c23a526327a8842c4001dd5a32d17a3788cc6552f2df4d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5debb00901952ee67ba559c4ae3cfbdfbe6ee86df528261c5c9c07b3409bdb12
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5831AD310083009FD304EF68D881EAFBBE8EF99354F14093DF585961A2EB719949CBA2

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 993 a8dbbe-a8dbda lstrlenW 994 a8dbdc-a8dbe6 GetFileAttributesW 993->994 995 a8dc06 993->995 996 a8dbe8-a8dbf7 FindFirstFileW 994->996 997 a8dc09-a8dc0d 994->997 995->997 996->995 998 a8dbf9-a8dc04 FindClose 996->998 998->997
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,00A65222), ref: 00A8DBCE
                                                                                                                                                                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 00A8DBDD
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A8DBEE
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A8DBFA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2695905019-0
                                                                                                                                                                                                                    • Opcode ID: e734f02cd5102f77ce5706cfe8e9e0ad16c819b47a103790d1d918654c2ccb6b
                                                                                                                                                                                                                    • Instruction ID: 0475fc79f17b4d2da070f2e39f39736eb918586992cfa874f38d513a7b6d181b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e734f02cd5102f77ce5706cfe8e9e0ad16c819b47a103790d1d918654c2ccb6b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 45F0A9B081091067C220BBBCAC0D8AA37AC9E02334B104702F836C20F1EBB09D968696
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00A528E9,?,00A44CBE,00A528E9,00AE88B8,0000000C,00A44E15,00A528E9,00000002,00000000,?,00A528E9), ref: 00A44D09
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,?,00A44CBE,00A528E9,00AE88B8,0000000C,00A44E15,00A528E9,00000002,00000000,?,00A528E9), ref: 00A44D10
                                                                                                                                                                                                                    • ExitProcess.KERNEL32 ref: 00A44D22
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1703294689-0
                                                                                                                                                                                                                    • Opcode ID: 43d2c68ae26043adb81b4d8be41ffa52cdc4e901f5d6cbff143b43fc2ab8932d
                                                                                                                                                                                                                    • Instruction ID: d5db5c1e92b636a5c86c4fbe2b3a1a3978dee6a40fc5def3f7bb6a95d4a4197d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 43d2c68ae26043adb81b4d8be41ffa52cdc4e901f5d6cbff143b43fc2ab8932d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E6E0B635400148AFCF11AF94DE09E597BA9FB85791F504118FC059A133CB35DD42CA80

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 0 aaaff9-aab056 call a42340 3 aab058-aab06b call a2b567 0->3 4 aab094-aab098 0->4 12 aab0c8 3->12 13 aab06d-aab092 call a2b567 * 2 3->13 6 aab09a-aab0bb call a2b567 * 2 4->6 7 aab0dd-aab0e0 4->7 28 aab0bf-aab0c4 6->28 9 aab0e2-aab0e5 7->9 10 aab0f5-aab119 call a27510 call a27620 7->10 14 aab0e8-aab0ed call a2b567 9->14 31 aab1d8-aab1e0 10->31 32 aab11f-aab178 call a27510 call a27620 call a27510 call a27620 call a27510 call a27620 10->32 17 aab0cb-aab0cf 12->17 13->28 14->10 22 aab0d9-aab0db 17->22 23 aab0d1-aab0d7 17->23 22->7 22->10 23->14 28->7 33 aab0c6 28->33 36 aab20a-aab238 GetCurrentDirectoryW call a3fe0b GetCurrentDirectoryW 31->36 37 aab1e2-aab1fd call a27510 call a27620 31->37 82 aab17a-aab195 call a27510 call a27620 32->82 83 aab1a6-aab1d6 GetSystemDirectoryW call a3fe0b GetSystemDirectoryW 32->83 33->17 45 aab23c 36->45 37->36 53 aab1ff-aab208 call a44963 37->53 48 aab240-aab244 45->48 51 aab246-aab270 call a29c6e * 3 48->51 52 aab275-aab285 call a900d9 48->52 51->52 64 aab28b-aab2e1 call a907c0 call a906e6 call a905a7 52->64 65 aab287-aab289 52->65 53->36 53->52 66 aab2ee-aab2f2 64->66 98 aab2e3 64->98 65->66 71 aab39a-aab3be CreateProcessW 66->71 72 aab2f8-aab321 call a811c8 66->72 76 aab3c1-aab3d4 call a3fe14 * 2 71->76 87 aab32a call a814ce 72->87 88 aab323-aab328 call a81201 72->88 103 aab42f-aab43d CloseHandle 76->103 104 aab3d6-aab3e8 76->104 82->83 105 aab197-aab1a0 call a44963 82->105 83->45 97 aab32f-aab33c call a44963 87->97 88->97 113 aab33e-aab345 97->113 114 aab347-aab357 call a44963 97->114 98->66 107 aab43f-aab444 103->107 108 aab49c 103->108 109 aab3ea 104->109 110 aab3ed-aab3fc 104->110 105->48 105->83 115 aab451-aab456 107->115 116 aab446-aab44c CloseHandle 107->116 111 aab4a0-aab4a4 108->111 109->110 117 aab3fe 110->117 118 aab401-aab42a GetLastError call a2630c call a2cfa0 110->118 119 aab4b2-aab4bc 111->119 120 aab4a6-aab4b0 111->120 113->113 113->114 136 aab359-aab360 114->136 137 aab362-aab372 call a44963 114->137 123 aab458-aab45e CloseHandle 115->123 124 aab463-aab468 115->124 116->115 117->118 127 aab4e5-aab4f6 call a90175 118->127 128 aab4be 119->128 129 aab4c4-aab4e3 call a2cfa0 CloseHandle 119->129 120->127 123->124 131 aab46a-aab470 CloseHandle 124->131 132 aab475-aab49a call a909d9 call aab536 124->132 128->129 129->127 131->132 132->111 136->136 136->137 146 aab37d-aab398 call a3fe14 * 3 137->146 147 aab374-aab37b 137->147 146->76 147->146 147->147
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAB198
                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00AAB1B0
                                                                                                                                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00AAB1D4
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAB200
                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00AAB214
                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00AAB236
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAB332
                                                                                                                                                                                                                      • Part of subcall function 00A905A7: GetStdHandle.KERNEL32(000000F6), ref: 00A905C6
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAB34B
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAB366
                                                                                                                                                                                                                    • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00AAB3B6
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000), ref: 00AAB407
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00AAB439
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAB44A
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAB45C
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAB46E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00AAB4E3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2178637699-0
                                                                                                                                                                                                                    • Opcode ID: 3ba9cc08a35eb806719d266ca0affb1aac04fd68b58e2424eb1319643f679819
                                                                                                                                                                                                                    • Instruction ID: 79f03b7514d62a72b20d6bad78767be1d7d16842798cfa3a812250f011c3f366
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3ba9cc08a35eb806719d266ca0affb1aac04fd68b58e2424eb1319643f679819
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D9F1AD316143009FCB14EF28C991B6EBBE5AF86310F14856DF8959B2E2DB31EC45CB62
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetInputState.USER32 ref: 00A2D807
                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 00A2DA07
                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A2DB28
                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 00A2DB7B
                                                                                                                                                                                                                    • DispatchMessageW.USER32(?), ref: 00A2DB89
                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A2DB9F
                                                                                                                                                                                                                    • Sleep.KERNELBASE(0000000A), ref: 00A2DBB1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2189390790-0
                                                                                                                                                                                                                    • Opcode ID: 39e02bf3637304c03accaf97bd61e7b20ff04cc3ddbb33cbd8a6dd0c64da756b
                                                                                                                                                                                                                    • Instruction ID: 049026df6b21a21c71477b86b1a34db107a27b4aa0bf3cea9b7c488d4a27ed7d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 39e02bf3637304c03accaf97bd61e7b20ff04cc3ddbb33cbd8a6dd0c64da756b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5142D070608251DFD729CF28D854FAABBF1BF85314F148A2DF49987292D770E885CB92

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00A22D07
                                                                                                                                                                                                                    • RegisterClassExW.USER32(00000030), ref: 00A22D31
                                                                                                                                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A22D42
                                                                                                                                                                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00A22D5F
                                                                                                                                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A22D6F
                                                                                                                                                                                                                    • LoadIconW.USER32(000000A9), ref: 00A22D85
                                                                                                                                                                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A22D94
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                    • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                    • Opcode ID: cdca66049fed15ba8620e75e5b4063e5a7bb600c36eaeec42c39d24e64d18729
                                                                                                                                                                                                                    • Instruction ID: 27c310c9e90c63443b94815b1c9bb8397b1b98cb5e30ad9b99476d1af48051ce
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cdca66049fed15ba8620e75e5b4063e5a7bb600c36eaeec42c39d24e64d18729
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3D21C0B5911218EFDB00DFE4E889BEDBBB8FB08714F10821AF551AA2A1D7B14546CF91

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 457 a6065b-a6068b call a6042f 460 a606a6-a606b2 call a55221 457->460 461 a6068d-a60698 call a4f2c6 457->461 467 a606b4-a606c9 call a4f2c6 call a4f2d9 460->467 468 a606cb-a60714 call a6039a 460->468 466 a6069a-a606a1 call a4f2d9 461->466 478 a6097d-a60983 466->478 467->466 476 a60716-a6071f 468->476 477 a60781-a6078a GetFileType 468->477 480 a60756-a6077c GetLastError call a4f2a3 476->480 481 a60721-a60725 476->481 482 a607d3-a607d6 477->482 483 a6078c-a607bd GetLastError call a4f2a3 CloseHandle 477->483 480->466 481->480 487 a60727-a60754 call a6039a 481->487 485 a607df-a607e5 482->485 486 a607d8-a607dd 482->486 483->466 494 a607c3-a607ce call a4f2d9 483->494 490 a607e9-a60837 call a5516a 485->490 491 a607e7 485->491 486->490 487->477 487->480 500 a60847-a6086b call a6014d 490->500 501 a60839-a60845 call a605ab 490->501 491->490 494->466 506 a6087e-a608c1 500->506 507 a6086d 500->507 501->500 508 a6086f-a60879 call a586ae 501->508 510 a608e2-a608f0 506->510 511 a608c3-a608c7 506->511 507->508 508->478 514 a608f6-a608fa 510->514 515 a6097b 510->515 511->510 513 a608c9-a608dd 511->513 513->510 514->515 516 a608fc-a6092f CloseHandle call a6039a 514->516 515->478 519 a60963-a60977 516->519 520 a60931-a6095d GetLastError call a4f2a3 call a55333 516->520 519->515 520->519
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A6039A: CreateFileW.KERNELBASE(00000000,00000000,?,00A60704,?,?,00000000,?,00A60704,00000000,0000000C), ref: 00A603B7
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A6076F
                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 00A60776
                                                                                                                                                                                                                    • GetFileType.KERNELBASE(00000000), ref: 00A60782
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A6078C
                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 00A60795
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00A607B5
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00A608FF
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A60931
                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 00A60938
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                    • String ID: H
                                                                                                                                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                    • Opcode ID: c711704e0c356abd75d7309ace5ed093927685064608e7f357898acc01134347
                                                                                                                                                                                                                    • Instruction ID: 3a52be84d5277446db5587a1d02f0d3cbcf1da6e37f8a7caacf84e5e30976ddd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c711704e0c356abd75d7309ace5ed093927685064608e7f357898acc01134347
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 34A12236A101088FDF19EFA8D851FAE7BB0AB46320F140159F815AF3A2DB759D53CB91

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AF1418,?,00A22E7F,?,?,?,00000000), ref: 00A23A78
                                                                                                                                                                                                                      • Part of subcall function 00A23357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A23379
                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A2356A
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A6318D
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A631CE
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00A63210
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A63277
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A63286
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                    • API String ID: 98802146-2727554177
                                                                                                                                                                                                                    • Opcode ID: c724e580fa04597d46a4a83f9f889823af076fb342858a48804fb7ce2816786a
                                                                                                                                                                                                                    • Instruction ID: ff558b92f5e0605720cd99ff8e70eba0e05d8cf91df5f0f80b973cc8c3c130e7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c724e580fa04597d46a4a83f9f889823af076fb342858a48804fb7ce2816786a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A47190B24053019FC714EFA9ED81AABBBF8FF95740F400A2DF5458B161EB349A4ACB51

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00A22B8E
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00A22B9D
                                                                                                                                                                                                                    • LoadIconW.USER32(00000063), ref: 00A22BB3
                                                                                                                                                                                                                    • LoadIconW.USER32(000000A4), ref: 00A22BC5
                                                                                                                                                                                                                    • LoadIconW.USER32(000000A2), ref: 00A22BD7
                                                                                                                                                                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A22BEF
                                                                                                                                                                                                                    • RegisterClassExW.USER32(?), ref: 00A22C40
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: GetSysColorBrush.USER32(0000000F), ref: 00A22D07
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: RegisterClassExW.USER32(00000030), ref: 00A22D31
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A22D42
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: InitCommonControlsEx.COMCTL32(?), ref: 00A22D5F
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00A22D6F
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: LoadIconW.USER32(000000A9), ref: 00A22D85
                                                                                                                                                                                                                      • Part of subcall function 00A22CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00A22D94
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                    • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                    • API String ID: 423443420-4155596026
                                                                                                                                                                                                                    • Opcode ID: f8c9b6a217649883991e35bc66324874a544224259b3a5aef051ce5e8c96f9d8
                                                                                                                                                                                                                    • Instruction ID: f9b50538e82773be11ae446c019c77afaf862c1a3f1cdd88a2707c5ece2be9f5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f8c9b6a217649883991e35bc66324874a544224259b3a5aef051ce5e8c96f9d8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F0211A71E00315EBDB50DFE6EC59EA9BFB4FB48B54F00022AE500AB6A1D7B14546CF90

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 598 a23170-a23185 599 a23187-a2318a 598->599 600 a231e5-a231e7 598->600 601 a231eb 599->601 602 a2318c-a23193 599->602 600->599 603 a231e9 600->603 607 a231f1-a231f6 601->607 608 a62dfb-a62e23 call a218e2 call a3e499 601->608 604 a23265-a2326d PostQuitMessage 602->604 605 a23199-a2319e 602->605 606 a231d0-a231d8 DefWindowProcW 603->606 613 a23219-a2321b 604->613 610 a231a4-a231a8 605->610 611 a62e7c-a62e90 call a8bf30 605->611 612 a231de-a231e4 606->612 614 a231f8-a231fb 607->614 615 a2321d-a23244 SetTimer RegisterWindowMessageW 607->615 642 a62e28-a62e2f 608->642 617 a231ae-a231b3 610->617 618 a62e68-a62e72 call a8c161 610->618 611->613 635 a62e96 611->635 613->612 621 a23201-a2320f KillTimer call a230f2 614->621 622 a62d9c-a62d9f 614->622 615->613 619 a23246-a23251 CreatePopupMenu 615->619 625 a62e4d-a62e54 617->625 626 a231b9-a231be 617->626 631 a62e77 618->631 619->613 639 a23214 call a23c50 621->639 628 a62dd7-a62df6 MoveWindow 622->628 629 a62da1-a62da5 622->629 625->606 638 a62e5a-a62e63 call a80ad7 625->638 633 a23253-a23263 call a2326f 626->633 634 a231c4-a231ca 626->634 628->613 636 a62dc6-a62dd2 SetFocus 629->636 637 a62da7-a62daa 629->637 631->613 633->613 634->606 634->642 635->606 636->613 637->634 643 a62db0-a62dc1 call a218e2 637->643 638->606 639->613 642->606 646 a62e35-a62e48 call a230f2 call a23837 642->646 643->613 646->606
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00A2316A,?,?), ref: 00A231D8
                                                                                                                                                                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,00A2316A,?,?), ref: 00A23204
                                                                                                                                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A23227
                                                                                                                                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00A2316A,?,?), ref: 00A23232
                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00A23246
                                                                                                                                                                                                                    • PostQuitMessage.USER32(00000000), ref: 00A23267
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                    • String ID: TaskbarCreated
                                                                                                                                                                                                                    • API String ID: 129472671-2362178303
                                                                                                                                                                                                                    • Opcode ID: 7c66081bb731701ab1a07d6ee06991ce8e99edcf456e06defd8d8d18c0e5af32
                                                                                                                                                                                                                    • Instruction ID: bd47981844a75a4a7d8f1ef45d0c480af96da98c5300d0b5dd7a6d641c7de888
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c66081bb731701ab1a07d6ee06991ce8e99edcf456e06defd8d8d18c0e5af32
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B8410637240228E7DF149BFCAD4DBB93A39EB17350F040235F6419A1A2DB6ACA41D7A1

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 654 a21410-a21449 655 a2144f-a21465 mciSendStringW 654->655 656 a624b8-a624b9 DestroyWindow 654->656 657 a216c6-a216d3 655->657 658 a2146b-a21473 655->658 659 a624c4-a624d1 656->659 661 a216d5-a216f0 UnregisterHotKey 657->661 662 a216f8-a216ff 657->662 658->659 660 a21479-a21488 call a2182e 658->660 666 a624d3-a624d6 659->666 667 a62500-a62507 659->667 674 a6250e-a6251a 660->674 675 a2148e-a21496 660->675 661->662 664 a216f2-a216f3 call a210d0 661->664 662->658 665 a21705 662->665 664->662 665->657 671 a624e2-a624e5 FindClose 666->671 672 a624d8-a624e0 call a26246 666->672 667->659 670 a62509 667->670 670->674 676 a624eb-a624f8 671->676 672->676 681 a62524-a6252b 674->681 682 a6251c-a6251e FreeLibrary 674->682 678 a62532-a6253f 675->678 679 a2149c-a214c1 call a2cfa0 675->679 676->667 680 a624fa-a624fb call a932b1 676->680 686 a62566-a6256d 678->686 687 a62541-a6255e VirtualFree 678->687 692 a214c3 679->692 693 a214f8-a21503 CoUninitialize 679->693 680->667 681->674 685 a6252d 681->685 682->681 685->678 686->678 689 a6256f 686->689 687->686 688 a62560-a62561 call a93317 687->688 688->686 694 a62574-a62578 689->694 695 a214c6-a214f6 call a21a05 call a219ae 692->695 693->694 696 a21509-a2150e 693->696 694->696 697 a6257e-a62584 694->697 695->693 699 a21514-a2151e 696->699 700 a62589-a62596 call a932eb 696->700 697->696 701 a21707-a21714 call a3f80e 699->701 702 a21524-a215a5 call a2988f call a21944 call a217d5 call a3fe14 call a2177c call a2988f call a2cfa0 call a217fe call a3fe14 699->702 713 a62598 700->713 701->702 715 a2171a 701->715 717 a6259d-a625bf call a3fdcd 702->717 743 a215ab-a215cf call a3fe14 702->743 713->717 715->701 722 a625c1 717->722 725 a625c6-a625e8 call a3fdcd 722->725 731 a625ea 725->731 734 a625ef-a62611 call a3fdcd 731->734 741 a62613 734->741 744 a62618-a62625 call a864d4 741->744 743->725 750 a215d5-a215f9 call a3fe14 743->750 749 a62627 744->749 752 a6262c-a62639 call a3ac64 749->752 750->734 755 a215ff-a21619 call a3fe14 750->755 758 a6263b 752->758 755->744 760 a2161f-a21643 call a217d5 call a3fe14 755->760 761 a62640-a6264d call a93245 758->761 760->752 769 a21649-a21651 760->769 768 a6264f 761->768 771 a62654-a62661 call a932cc 768->771 769->761 770 a21657-a21675 call a2988f call a2190a 769->770 770->771 780 a2167b-a21689 770->780 777 a62663 771->777 779 a62668-a62675 call a932cc 777->779 785 a62677 779->785 780->779 782 a2168f-a216c5 call a2988f * 3 call a21876 780->782 785->785
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00A21459
                                                                                                                                                                                                                    • CoUninitialize.COMBASE ref: 00A214F8
                                                                                                                                                                                                                    • UnregisterHotKey.USER32(?), ref: 00A216DD
                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00A624B9
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00A6251E
                                                                                                                                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A6254B
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                    • String ID: close all
                                                                                                                                                                                                                    • API String ID: 469580280-3243417748
                                                                                                                                                                                                                    • Opcode ID: 344a8ee2e5764da4f4cfa8beedabf85141fb77de484d26c847d225088862671b
                                                                                                                                                                                                                    • Instruction ID: 09cdfbdcb056566998294a8181f0c0ef05382d74b4a4723bdab3fdcb23db77c7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 344a8ee2e5764da4f4cfa8beedabf85141fb77de484d26c847d225088862671b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0DD17B317012228FDB29EF18D599B69F7B4BF15710F2442ADE44A6B262DB30AD12CF91

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 803 a22c63-a22cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A22C91
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A22CB2
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00A21CAD,?), ref: 00A22CC6
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00A21CAD,?), ref: 00A22CCF
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$CreateShow
                                                                                                                                                                                                                    • String ID: AutoIt v3$edit
                                                                                                                                                                                                                    • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                    • Opcode ID: 6bfc2319922692422fe25cf06adee5e65b525a3800619bb4c4c11833de6419fa
                                                                                                                                                                                                                    • Instruction ID: 391c94dff205899a736b5cc90ecc71fd5204bbd93599e8c755ca0e4903ab9d53
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6bfc2319922692422fe25cf06adee5e65b525a3800619bb4c4c11833de6419fa
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EBF0DA7A540290BAEB719797AC0CEB72EBDD7C7F70B00015AF900AB5A1D6611852DAB0

                                                                                                                                                                                                                    Control-flow Graph

                                                                                                                                                                                                                    • Executed
                                                                                                                                                                                                                    • Not Executed
                                                                                                                                                                                                                    control_flow_graph 954 a23b1c-a23b27 955 a23b99-a23b9b 954->955 956 a23b29-a23b2e 954->956 958 a23b8c-a23b8f 955->958 956->955 957 a23b30-a23b48 RegOpenKeyExW 956->957 957->955 959 a23b4a-a23b69 RegQueryValueExW 957->959 960 a23b80-a23b8b RegCloseKey 959->960 961 a23b6b-a23b76 959->961 960->958 962 a23b90-a23b97 961->962 963 a23b78-a23b7a 961->963 964 a23b7e 962->964 963->964 964->960
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00A23B0F,SwapMouseButtons,00000004,?), ref: 00A23B40
                                                                                                                                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00A23B0F,SwapMouseButtons,00000004,?), ref: 00A23B61
                                                                                                                                                                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00A23B0F,SwapMouseButtons,00000004,?), ref: 00A23B83
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                    • String ID: Control Panel\Mouse
                                                                                                                                                                                                                    • API String ID: 3677997916-824357125
                                                                                                                                                                                                                    • Opcode ID: 75164c5ed6ac0b9884f1c127c4a7b3293771bf3abd4d98baba66453729fc554c
                                                                                                                                                                                                                    • Instruction ID: 619978ff00710dd88524384259e26ec41459e53dead0efe98abccdda155b7282
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 75164c5ed6ac0b9884f1c127c4a7b3293771bf3abd4d98baba66453729fc554c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48112AB6511218FFDF20CFA9EC44EAEB7B8EF05754B104569B806D7120E2759E419B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A633A2
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A23A04
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                    • String ID: Line:
                                                                                                                                                                                                                    • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                    • Opcode ID: 7e43f793dccc18cb2f92fdc501c570b6d8fbd56a16dc1f6eb73d029b61cad1a1
                                                                                                                                                                                                                    • Instruction ID: ef66c78e5ef91933bde40a783486475f99344d5eae5ebb7160846fd26989cf9b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7e43f793dccc18cb2f92fdc501c570b6d8fbd56a16dc1f6eb73d029b61cad1a1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A31F672508324AACB25EB58ED45FEB73E8AF46710F000A3AF59987191DB749649C7C2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00A40668
                                                                                                                                                                                                                      • Part of subcall function 00A432A4: RaiseException.KERNEL32(?,?,?,00A4068A,?,00AF1444,?,?,?,?,?,?,00A4068A,00A21129,00AE8738,00A21129), ref: 00A43304
                                                                                                                                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00A40685
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                    • String ID: Unknown exception
                                                                                                                                                                                                                    • API String ID: 3476068407-410509341
                                                                                                                                                                                                                    • Opcode ID: 8466c48bce4f974d05bfcb89a62c23b66022cc1b6c4b8b5daf3a7435e5c49d39
                                                                                                                                                                                                                    • Instruction ID: f6a789cb1c867b25c90061a5b69ecafa73a3eb368da1eed790daee6c1829f805
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8466c48bce4f974d05bfcb89a62c23b66022cc1b6c4b8b5daf3a7435e5c49d39
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 29F0C23C90030DBB8F00BB64E94AD9EB77CAE90354B604531BA18D6596EFB1DA25D981
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A21BF4
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00A21BFC
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A21C07
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A21C12
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00A21C1A
                                                                                                                                                                                                                      • Part of subcall function 00A21BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00A21C22
                                                                                                                                                                                                                      • Part of subcall function 00A21B4A: RegisterWindowMessageW.USER32(00000004,?,00A212C4), ref: 00A21BA2
                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00A2136A
                                                                                                                                                                                                                    • OleInitialize.OLE32 ref: 00A21388
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 00A624AB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1986988660-0
                                                                                                                                                                                                                    • Opcode ID: 2b3d0b61c7b4145690b38e4b63ab9c0a9ce4d41ebd9309441c235b10c3631acf
                                                                                                                                                                                                                    • Instruction ID: 92edbc33922ed63aae15f116f483fd327b5630b3c4175f982a8b811fcaf00441
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2b3d0b61c7b4145690b38e4b63ab9c0a9ce4d41ebd9309441c235b10c3631acf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2271AEB4911204CFD384EFFAAA45A753AE4FBA8394754823AE11ACB361EB314447CF80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A23A04
                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A8C259
                                                                                                                                                                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 00A8C261
                                                                                                                                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A8C270
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3500052701-0
                                                                                                                                                                                                                    • Opcode ID: 0eb8b9805b0571fb1cacb0d13d3673eece82cbe292697be6e8e07be7fed75139
                                                                                                                                                                                                                    • Instruction ID: f654fb1cc4a4d9366606bf854cb001b5627f6813e4b99a0d4e7acd344bcbb5ee
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0eb8b9805b0571fb1cacb0d13d3673eece82cbe292697be6e8e07be7fed75139
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5731C570904354AFEB62EFA48895BE7BBFC9B06314F00049AD1DA97282D7745A85CF61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,?,00A585CC,?,00AE8CC8,0000000C), ref: 00A58704
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00A585CC,?,00AE8CC8,0000000C), ref: 00A5870E
                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 00A58739
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2583163307-0
                                                                                                                                                                                                                    • Opcode ID: 497a8b4cef70c7ec5766ca6a2ad89f9608307f83cc29f0ae0653b4ed3b060aa4
                                                                                                                                                                                                                    • Instruction ID: 5e62b49423e012f5e8c46b3214cbf52e0c7c3e8a87b8cc73e92fab4500035242
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 497a8b4cef70c7ec5766ca6a2ad89f9608307f83cc29f0ae0653b4ed3b060aa4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 31016B32A052201BD360A374A955B7E67496F82776F390219FC08AF0E3DEB88C89C250
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 00A2DB7B
                                                                                                                                                                                                                    • DispatchMessageW.USER32(?), ref: 00A2DB89
                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A2DB9F
                                                                                                                                                                                                                    • Sleep.KERNELBASE(0000000A), ref: 00A2DBB1
                                                                                                                                                                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00A71CC9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3288985973-0
                                                                                                                                                                                                                    • Opcode ID: 3a5a11c3860a5cb2e73f7feede534027ea3b565527411d6291914f54d5c7471b
                                                                                                                                                                                                                    • Instruction ID: 3cdcdf046e44926026845c05d850be4fb22292e420a1e6f858d1a8c3ff8daa5a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3a5a11c3860a5cb2e73f7feede534027ea3b565527411d6291914f54d5c7471b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CAF0FE306443449BE730CBE49D99FEA77E8EB45350F108A29F65AD30D1DB309589CB65
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • __Init_thread_footer.LIBCMT ref: 00A317F6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Init_thread_footer
                                                                                                                                                                                                                    • String ID: CALL
                                                                                                                                                                                                                    • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                    • Opcode ID: 0e889c67b457d05180da6ab50e8b9d366079af8d2a3f12c10e98f17efac9a7e0
                                                                                                                                                                                                                    • Instruction ID: bfb405e47438a3dd6d3644196c069814b3938a13f7b56b4ebf1351f93c2ac581
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0e889c67b457d05180da6ab50e8b9d366079af8d2a3f12c10e98f17efac9a7e0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 87227B706083019FC714DF14C985B2ABBF1BF89314F28896DF49A8B362D775E945CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00A62C8C
                                                                                                                                                                                                                      • Part of subcall function 00A23AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A23A97,?,?,00A22E7F,?,?,?,00000000), ref: 00A23AC2
                                                                                                                                                                                                                      • Part of subcall function 00A22DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A22DC4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                    • String ID: X
                                                                                                                                                                                                                    • API String ID: 779396738-3081909835
                                                                                                                                                                                                                    • Opcode ID: 7188ece5a5549476c80c1fcc40cee93f883c9b3bd222907da275af8687fb0694
                                                                                                                                                                                                                    • Instruction ID: 40f300e9b4410ea10d095d08e28e332a350eed261430a9c864367414f492913a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7188ece5a5549476c80c1fcc40cee93f883c9b3bd222907da275af8687fb0694
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E421A871A002989FCF05EF98D945BEE7BF89F59314F004069E405B7241DBB856498FA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A23908
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconNotifyShell_
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1144537725-0
                                                                                                                                                                                                                    • Opcode ID: e6a5bb1afe6daf7535db798e741fabd40b489479fdb09349ddd75c79ed43de6c
                                                                                                                                                                                                                    • Instruction ID: 1ccf87362cf5991a7414edddbdb8cc7813819ec7053525c9269aa3c974817d89
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e6a5bb1afe6daf7535db798e741fabd40b489479fdb09349ddd75c79ed43de6c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC31D571604311CFD760DFA8D884BA7BBF4FB4A318F00092EF5998B250E775AA45CB52
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 00A3F661
                                                                                                                                                                                                                      • Part of subcall function 00A2D730: GetInputState.USER32 ref: 00A2D807
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 00A7F2DE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InputSleepStateTimetime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4149333218-0
                                                                                                                                                                                                                    • Opcode ID: 0acffcf4367f19659e8d2eb4b9946429f1d9f19ace6493b0418cd015925b299f
                                                                                                                                                                                                                    • Instruction ID: 45e2d75c57bb743b12ca4e5958dc5f013dc158e61064edba73a86dcc8757533e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0acffcf4367f19659e8d2eb4b9946429f1d9f19ace6493b0418cd015925b299f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0AF08C31240615AFD310EF69E949F6AB7E8EF45760F00413AE85ACB262DB70A800CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A24E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A24EDD,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E9C
                                                                                                                                                                                                                      • Part of subcall function 00A24E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A24EAE
                                                                                                                                                                                                                      • Part of subcall function 00A24E90: FreeLibrary.KERNEL32(00000000,?,?,00A24EDD,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24EC0
                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24EFD
                                                                                                                                                                                                                      • Part of subcall function 00A24E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A63CDE,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E62
                                                                                                                                                                                                                      • Part of subcall function 00A24E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A24E74
                                                                                                                                                                                                                      • Part of subcall function 00A24E59: FreeLibrary.KERNEL32(00000000,?,?,00A63CDE,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E87
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2632591731-0
                                                                                                                                                                                                                    • Opcode ID: 3af8f5e76e278fc740b0994d5ffe35e5a7e010109ce02234b92202ae952c62c6
                                                                                                                                                                                                                    • Instruction ID: 4d93be70482f0cc0f3055f69a4051fa2fbe0f603c748699b2517a8cdd2945212
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3af8f5e76e278fc740b0994d5ffe35e5a7e010109ce02234b92202ae952c62c6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0011CA32610225AADF14FF78EE02FED77A5AF98B10F10843DF542A61D1DE709E459B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: __wsopen_s
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3347428461-0
                                                                                                                                                                                                                    • Opcode ID: 8a65d21d7e2a52503c54b1b5ecebe7ca65a71d1593face82f5a5071f7adc8921
                                                                                                                                                                                                                    • Instruction ID: bb407a360f1c17b374abddb935878a36ccd7a66e3e018613fd74af28f2846ae2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8a65d21d7e2a52503c54b1b5ecebe7ca65a71d1593face82f5a5071f7adc8921
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B811187590410AAFCB05DF58E94199B7BF9FF48315F104059FC09AB312DA31DA15CBA5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A54C7D: RtlAllocateHeap.NTDLL(00000008,00A21129,00000000,?,00A52E29,00000001,00000364,?,?,?,00A4F2DE,00A53863,00AF1444,?,00A3FDF5,?), ref: 00A54CBE
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5506C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap_free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 614378929-0
                                                                                                                                                                                                                    • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                    • Instruction ID: 9a84987e5888728e72471f4dfee63733de0eca72d461a1d294ad94d77b539cf4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 12014E726047045FE3318F65D841A5AFBECFBC9371F25052DE984932C0E6306909C774
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                    • Instruction ID: 96e484bf5051a886452ad9f32bf11c223cac8b2c8ba7ae8caf5681c8f677a983
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 27F0783A500A109AC7317B798E05B9BB39CBFD2332F110B15FC20A32C2CB74D80586A5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00000008,00A21129,00000000,?,00A52E29,00000001,00000364,?,?,?,00A4F2DE,00A53863,00AF1444,?,00A3FDF5,?), ref: 00A54CBE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: 9d9ba78eb66a37c1815927f2227a2b35bfd1425fa3b9586b236f631c0de51685
                                                                                                                                                                                                                    • Instruction ID: 041ebdc64d27677b6711cf88444ad9927df073faf8c7931ef07396dc6ca68e12
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9d9ba78eb66a37c1815927f2227a2b35bfd1425fa3b9586b236f631c0de51685
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 64F0E93160733467DB215F639D05F5A3798BFC97BAB144211BC15AB292CA70D84986E0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6,?,00A21129), ref: 00A53852
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1279760036-0
                                                                                                                                                                                                                    • Opcode ID: 739fbafaa1de76394ea19fcf77775c0f3450aac8d099428a169c83d57957867e
                                                                                                                                                                                                                    • Instruction ID: c63657b3b41879761dfbe76be9ce01882d827a450d09d85dea71c4cb6ade6544
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 739fbafaa1de76394ea19fcf77775c0f3450aac8d099428a169c83d57957867e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80E0E537102224B6DE352BB79D01B9A3658BBD27F2F050121BC14A7491CB71DD0581E0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24F6D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeLibrary
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3664257935-0
                                                                                                                                                                                                                    • Opcode ID: f9c286ac79c0d95024a1e76709ebfc3a5ea9d5142adfa7fa0e780a1b2ca26735
                                                                                                                                                                                                                    • Instruction ID: be0eafc8090c47c5dc86babb7ce0b5e134c24c2065f44a620d2d10227ab07520
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9c286ac79c0d95024a1e76709ebfc3a5ea9d5142adfa7fa0e780a1b2ca26735
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1EF03071105761CFDB349F68E690812B7F4FF587293108A7EE5EA82521C7319844DF10
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 00AB2A66
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2353593579-0
                                                                                                                                                                                                                    • Opcode ID: aba6d69c2bbf1f0d2a8c0c599d3224689ffe21112fc6bcd6f7029fc4456f89a7
                                                                                                                                                                                                                    • Instruction ID: a64740b2bfced92b8035cb032e491cf855ed6b419f971af1fdc9c554b1af5b6f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aba6d69c2bbf1f0d2a8c0c599d3224689ffe21112fc6bcd6f7029fc4456f89a7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32E04F36390116AACB14EB30DC909FA775CEF543D5710453BEC26C2111DB30999687A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A2314E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconNotifyShell_
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1144537725-0
                                                                                                                                                                                                                    • Opcode ID: 73bf1168f1eeb6b47662b03333bbb683b599180d4e005ac6736087827c8cfa9a
                                                                                                                                                                                                                    • Instruction ID: f18248246871f10493904f3e0279bfe6bbd30de1af124d97d9d85024ddf2d5a2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 73bf1168f1eeb6b47662b03333bbb683b599180d4e005ac6736087827c8cfa9a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7FF037719143189FEB92DFA4DC4ABE57BBCA701708F0001E5A5489A192D7745B89CF51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A22DC4
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 541455249-0
                                                                                                                                                                                                                    • Opcode ID: 461574be977332e12d4c7253790510def9cd9f9f44d91333d2672a685a6ce294
                                                                                                                                                                                                                    • Instruction ID: c6bec2ac073f3a8be8b0cb2137f63d7f5a539c3f1d6e4aecd89ada48941bbcd2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 461574be977332e12d4c7253790510def9cd9f9f44d91333d2672a685a6ce294
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09E0CD726001245BC720E2989C05FDA77EDDFC8794F040172FD09D7258D960AD808550
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A23908
                                                                                                                                                                                                                      • Part of subcall function 00A2D730: GetInputState.USER32 ref: 00A2D807
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A22B6B
                                                                                                                                                                                                                      • Part of subcall function 00A230F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A2314E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3667716007-0
                                                                                                                                                                                                                    • Opcode ID: f40b8444d7d65a2dfe2669f01a32fedb4afd585f9691ef697996454b3004b688
                                                                                                                                                                                                                    • Instruction ID: 656d93a3eb03625250c6c0ec2101ba00218fa4f2e7484ebd924503bbd796e6ef
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f40b8444d7d65a2dfe2669f01a32fedb4afd585f9691ef697996454b3004b688
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7EE0262230422806CA04FBBCB91257DA3499BD2312F40053EF14247163CE2845468362
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,00A60704,?,?,00000000,?,00A60704,00000000,0000000C), ref: 00A603B7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateFile
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 823142352-0
                                                                                                                                                                                                                    • Opcode ID: c31d3325a10421aaf38b6d96b0a2d184d27d498f8a82e47b7293cd9eeaeda0f0
                                                                                                                                                                                                                    • Instruction ID: 80cc298b8e5986c8d11e7afaf5753ec1022d6d85bf01a3d0cd9aca2914f7342a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c31d3325a10421aaf38b6d96b0a2d184d27d498f8a82e47b7293cd9eeaeda0f0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DED06C3204010DBBDF028F84ED06EDA3BAAFB48714F014100BE1866021C732E832AB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00A21CBC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InfoParametersSystem
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3098949447-0
                                                                                                                                                                                                                    • Opcode ID: 59bc421b9b53ddb2b398b761d933a618c847df8d075222ff8c28fb550737522c
                                                                                                                                                                                                                    • Instruction ID: bc55fb1a7eec83695cf77cdcf052e87a90582e959521c0546413c12d6066227f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 59bc421b9b53ddb2b398b761d933a618c847df8d075222ff8c28fb550737522c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9CC092362C0305EFF224CBC0BC4EF207764A348B14F048201F609AA5F3C3A22822EB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00AB961A
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00AB965B
                                                                                                                                                                                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00AB969F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00AB96C9
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB96F2
                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 00AB978B
                                                                                                                                                                                                                    • GetKeyState.USER32(00000009), ref: 00AB9798
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00AB97AE
                                                                                                                                                                                                                    • GetKeyState.USER32(00000010), ref: 00AB97B8
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00AB97E9
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB9810
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001030,?,00AB7E95), ref: 00AB9918
                                                                                                                                                                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00AB992E
                                                                                                                                                                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00AB9941
                                                                                                                                                                                                                    • SetCapture.USER32(?), ref: 00AB994A
                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00AB99AF
                                                                                                                                                                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00AB99BC
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00AB99D6
                                                                                                                                                                                                                    • ReleaseCapture.USER32 ref: 00AB99E1
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB9A19
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB9A26
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00AB9A80
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB9AAE
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00AB9AEB
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB9B1A
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00AB9B3B
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00AB9B4A
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB9B68
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB9B75
                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00AB9B93
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00AB9BFA
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB9C2B
                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00AB9C84
                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00AB9CB4
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00AB9CDE
                                                                                                                                                                                                                    • SendMessageW.USER32 ref: 00AB9D01
                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00AB9D4E
                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00AB9D82
                                                                                                                                                                                                                      • Part of subcall function 00A39944: GetWindowLongW.USER32(?,000000EB), ref: 00A39952
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB9E05
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                    • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                    • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                    • Opcode ID: 404fcefe701cee680a22a59ebd9729a5506281e54d207bcc4a377e9eb0991a6b
                                                                                                                                                                                                                    • Instruction ID: f0006bee26c11c4a412d28284e94deef8d6acf06c84e10792ad1482234adb336
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 404fcefe701cee680a22a59ebd9729a5506281e54d207bcc4a377e9eb0991a6b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 14428A34204251AFDB24CF68CC94EABBBE9FF49320F104619F699872B2D771E851DB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00AB48F3
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00AB4908
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00AB4927
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00AB494B
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00AB495C
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00AB497B
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00AB49AE
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00AB49D4
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00AB4A0F
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00AB4A56
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00AB4A7E
                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00AB4A97
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AB4AF2
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AB4B20
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB4B94
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00AB4BE3
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00AB4C82
                                                                                                                                                                                                                    • wsprintfW.USER32 ref: 00AB4CAE
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00AB4CC9
                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00AB4CF1
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00AB4D13
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00AB4D33
                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00AB4D5A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                    • String ID: %d/%02d/%02d
                                                                                                                                                                                                                    • API String ID: 4054740463-328681919
                                                                                                                                                                                                                    • Opcode ID: d5b95fcd29aeff88ffbb4060880f1b31566bb10d7eee9d88cceb58aaff697600
                                                                                                                                                                                                                    • Instruction ID: 51c63972e2dffa5224d668e7bacfcc48e3b6a31f3ecb5b839e113f08bf50e634
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d5b95fcd29aeff88ffbb4060880f1b31566bb10d7eee9d88cceb58aaff697600
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4D12AC71600254ABEB258F68CD49FEE7BB8EF49710F104229F516EB2A3DB789941CB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00A3F998
                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A7F474
                                                                                                                                                                                                                    • IsIconic.USER32(00000000), ref: 00A7F47D
                                                                                                                                                                                                                    • ShowWindow.USER32(00000000,00000009), ref: 00A7F48A
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00A7F494
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A7F4AA
                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00A7F4B1
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A7F4BD
                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A7F4CE
                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A7F4D6
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00A7F4DE
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00A7F4E1
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7F4F6
                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00A7F501
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7F50B
                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00A7F510
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7F519
                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00A7F51E
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A7F528
                                                                                                                                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00A7F52D
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00A7F530
                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00A7F557
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                    • Opcode ID: f2400869f884ff2dc20044b54b5097836d7a8267d02d8c02e48dc7364ea9b28e
                                                                                                                                                                                                                    • Instruction ID: b28d99789175cd78503703a719b81e74b6cf671c4b5d21d14394fa4ff45a320e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2400869f884ff2dc20044b54b5097836d7a8267d02d8c02e48dc7364ea9b28e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1B316871A802187FEB30ABF59C49FBF7E7CEB44B60F104165FA05E61E2D6B15D01AA60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A8170D
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A8173A
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: GetLastError.KERNEL32 ref: 00A8174A
                                                                                                                                                                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00A81286
                                                                                                                                                                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00A812A8
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00A812B9
                                                                                                                                                                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A812D1
                                                                                                                                                                                                                    • GetProcessWindowStation.USER32 ref: 00A812EA
                                                                                                                                                                                                                    • SetProcessWindowStation.USER32(00000000), ref: 00A812F4
                                                                                                                                                                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A81310
                                                                                                                                                                                                                      • Part of subcall function 00A810BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A811FC), ref: 00A810D4
                                                                                                                                                                                                                      • Part of subcall function 00A810BF: CloseHandle.KERNEL32(?,?,00A811FC), ref: 00A810E9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                    • String ID: $default$winsta0
                                                                                                                                                                                                                    • API String ID: 22674027-1027155976
                                                                                                                                                                                                                    • Opcode ID: 929478f2e63a16123a93c7c64848f0fb1fade13a49aa9507f26d85ad57d442a6
                                                                                                                                                                                                                    • Instruction ID: 043f4cd54e187342da650a9292205a44e7ba81ab2ed69116f96230c2f0b0f197
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 929478f2e63a16123a93c7c64848f0fb1fade13a49aa9507f26d85ad57d442a6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A18179B1A00209ABDF21EFA4DD49FEE7BBDFF04714F144229F911A61A1D7318946CB20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A81114
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81120
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A8112F
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81136
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A8114D
                                                                                                                                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A80BCC
                                                                                                                                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A80C00
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00A80C17
                                                                                                                                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00A80C51
                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A80C6D
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00A80C84
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A80C8C
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00A80C93
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A80CB4
                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000), ref: 00A80CBB
                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A80CEA
                                                                                                                                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A80D0C
                                                                                                                                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A80D1E
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80D45
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80D4C
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80D55
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80D5C
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80D65
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80D6C
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00A80D78
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80D7F
                                                                                                                                                                                                                      • Part of subcall function 00A81193: GetProcessHeap.KERNEL32(00000008,00A80BB1,?,00000000,?,00A80BB1,?), ref: 00A811A1
                                                                                                                                                                                                                      • Part of subcall function 00A81193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A80BB1,?), ref: 00A811A8
                                                                                                                                                                                                                      • Part of subcall function 00A81193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A80BB1,?), ref: 00A811B7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4175595110-0
                                                                                                                                                                                                                    • Opcode ID: 92aa71e7dae9fde356fd340a646826704656acac616b0f5ba8d027823e2b5a3c
                                                                                                                                                                                                                    • Instruction ID: f65fbca390b2d712c14b7879afcc0d390141532a24a43445fc4887f2a41a2a0d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 92aa71e7dae9fde356fd340a646826704656acac616b0f5ba8d027823e2b5a3c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E715CB290021AAFDF50EFE4DC44FAEBBB8BF04310F144615F915A71A2D771A90ACB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • OpenClipboard.USER32(00ABCC08), ref: 00A9EB29
                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A9EB37
                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00A9EB43
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 00A9EB4F
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00A9EB87
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 00A9EB91
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00A9EBBC
                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00A9EBC9
                                                                                                                                                                                                                    • GetClipboardData.USER32(00000001), ref: 00A9EBD1
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00A9EBE2
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00A9EC22
                                                                                                                                                                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 00A9EC38
                                                                                                                                                                                                                    • GetClipboardData.USER32(0000000F), ref: 00A9EC44
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00A9EC55
                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00A9EC77
                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A9EC94
                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00A9ECD2
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00A9ECF3
                                                                                                                                                                                                                    • CountClipboardFormats.USER32 ref: 00A9ED14
                                                                                                                                                                                                                    • CloseClipboard.USER32 ref: 00A9ED59
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 420908878-0
                                                                                                                                                                                                                    • Opcode ID: 1d682192d25232b2ad691382853c95cc91951666c96eea811072fe863d972d30
                                                                                                                                                                                                                    • Instruction ID: f31c6f0937071ed7c776d5dd7c1509da0f698b54b12f2ef8e346c17df3289deb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d682192d25232b2ad691382853c95cc91951666c96eea811072fe863d972d30
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0761E235204202AFDB00EF68D895F6A77E8EF84724F04462DF4569B2A3DB31DD46CB62
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A969BE
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A96A12
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A96A4E
                                                                                                                                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A96A75
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A96AB2
                                                                                                                                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A96ADF
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                    • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                    • Opcode ID: bd6a6cc5ce70275041d18900562c8a2af9e6d20fde4454c734383e117e2b4d84
                                                                                                                                                                                                                    • Instruction ID: 08358028f5fe9614ff0b7c3c560e384d9a32802f0569ff90462887beac9f0e93
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bd6a6cc5ce70275041d18900562c8a2af9e6d20fde4454c734383e117e2b4d84
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3D150B1508350AFC714EBA4DA91EAFB7ECBF88704F44492DF585C6191EB34DA44CB62
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A99663
                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00A996A1
                                                                                                                                                                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00A996BB
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00A996D3
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A996DE
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00A996FA
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A9974A
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(00AE6B7C), ref: 00A99768
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A99772
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A9977F
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A9978F
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 1409584000-438819550
                                                                                                                                                                                                                    • Opcode ID: 259a17af48b3b0f7dc0b6aa417f53f73fd432df1e3bbc8cef5687f2fbe98d825
                                                                                                                                                                                                                    • Instruction ID: 01016f6188b2d0564e53e5005c645af4a926cf046725564b848f2383a4ff1d1d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 259a17af48b3b0f7dc0b6aa417f53f73fd432df1e3bbc8cef5687f2fbe98d825
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C631BD326406197BDF14EFF9DC48EDF77ECAF49320F14466AE905E21A1EB70DA418A20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A997BE
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00A99819
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A99824
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00A99840
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A99890
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(00AE6B7C), ref: 00A998AE
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A998B8
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A998C5
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A998D5
                                                                                                                                                                                                                      • Part of subcall function 00A8DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A8DB00
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 2640511053-438819550
                                                                                                                                                                                                                    • Opcode ID: be18bec40267d4b7a680f7f0c23c81e69b5dbae090ad8b3def6443dac9898b0a
                                                                                                                                                                                                                    • Instruction ID: 1411a331067d1903480504d8c2c1197ef1d3db0fde6732a04e02979a235f4fac
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: be18bec40267d4b7a680f7f0c23c81e69b5dbae090ad8b3def6443dac9898b0a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2631C3326406197BDF10EFB9DC48EDF77ECAF46320F14865EE814A21A1EB70D9858A60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AAB6AE,?,?), ref: 00AAC9B5
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AAC9F1
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA68
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA9E
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AABF3E
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00AABFA9
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AABFCD
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00AAC02C
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00AAC0E7
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00AAC154
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00AAC1E9
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00AAC23A
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00AAC2E3
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00AAC382
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AAC38F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3102970594-0
                                                                                                                                                                                                                    • Opcode ID: db5cfb43b1235717b0d71cda0212cbc8c8613eb37597d906bd5795ee6bc12a68
                                                                                                                                                                                                                    • Instruction ID: cd30e5e97692e0b2011a76a131022f0d178ce523b2d33f2eb65baf1d12e50061
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: db5cfb43b1235717b0d71cda0212cbc8c8613eb37597d906bd5795ee6bc12a68
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B025D71604210AFD714DF28C991E2ABBE5EF49314F1884ADF84ADF2A2D731ED45CB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLocalTime.KERNEL32(?), ref: 00A98257
                                                                                                                                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A98267
                                                                                                                                                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A98273
                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A98310
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A98324
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A98356
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A9838C
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A98395
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 1464919966-438819550
                                                                                                                                                                                                                    • Opcode ID: ffc2da28af860427c8329f6839bd5db108ec3644e02b6d6dec62ace8712244f7
                                                                                                                                                                                                                    • Instruction ID: 6587dc5ad65abb7d2fc383e730f5ab7d494ae29306328517e5ab91b2e7375f9d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ffc2da28af860427c8329f6839bd5db108ec3644e02b6d6dec62ace8712244f7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 11617A766043059FCB10EF64D9809AFB3E8FF89320F04492EF99997251DB35E905CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A23A97,?,?,00A22E7F,?,?,?,00000000), ref: 00A23AC2
                                                                                                                                                                                                                      • Part of subcall function 00A8E199: GetFileAttributesW.KERNEL32(?,00A8CF95), ref: 00A8E19A
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A8D122
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00A8D1DD
                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00A8D1F0
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A8D20D
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A8D237
                                                                                                                                                                                                                      • Part of subcall function 00A8D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00A8D21C,?,?), ref: 00A8D2B2
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 00A8D253
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A8D264
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                    • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                    • Opcode ID: 7b4f9819150b7c6b55625e0ceeaab5bb52d7e0bdbc02e4c56283c308716adf29
                                                                                                                                                                                                                    • Instruction ID: 0872783626665757742618f5e2ee77d0d854093df8840f876cb89cca80b84006
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b4f9819150b7c6b55625e0ceeaab5bb52d7e0bdbc02e4c56283c308716adf29
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F6614B31C0111DABCF05FBE4EA929EEB7B5AF55300F244169E406771A2EB31AF09DB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1737998785-0
                                                                                                                                                                                                                    • Opcode ID: 6e7befe4d8377e2ec62b1f51ac8b7c730bb5471ba0379adea4d111a429b1fae0
                                                                                                                                                                                                                    • Instruction ID: 87a2290f8288f11197beabd83579815f7314d6979d69a42e49691f259b7e0476
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6e7befe4d8377e2ec62b1f51ac8b7c730bb5471ba0379adea4d111a429b1fae0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4F418D35604611AFEB20DF59E888F19BBE5FF44328F14C199E4158B663C735EC42CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A8170D
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A8173A
                                                                                                                                                                                                                      • Part of subcall function 00A816C3: GetLastError.KERNEL32 ref: 00A8174A
                                                                                                                                                                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00A8E932
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                    • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                    • Opcode ID: 651059d8df619a6ece809c4ffdb938db8efaea9bfcd1e9a345cbd4ff79328fd9
                                                                                                                                                                                                                    • Instruction ID: b33ba674266f468892d24bca9be28bc7e33836ce5ced72d68df5b135f3806f5d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 651059d8df619a6ece809c4ffdb938db8efaea9bfcd1e9a345cbd4ff79328fd9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E701F972610211EBEB64B7B49C86FBFB26CA714760F154921FC13E21E2E6E09C4183A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00AA1276
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1283
                                                                                                                                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00AA12BA
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA12C5
                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 00AA12F4
                                                                                                                                                                                                                    • listen.WSOCK32(00000000,00000005), ref: 00AA1303
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA130D
                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 00AA133C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 540024437-0
                                                                                                                                                                                                                    • Opcode ID: 090c840d47945e6ec8d162c6642dc6aa7ff11500e340e2582125e747253b728f
                                                                                                                                                                                                                    • Instruction ID: dd6070e29a5114cfd4b0bf81b78298ae441969e012c20bd97a675bd1c7e9ec9a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 090c840d47945e6ec8d162c6642dc6aa7ff11500e340e2582125e747253b728f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF418431600210AFD710DF68D584B69BBE5AF46328F188198D8569F2E3C771ED86CBE1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A23A97,?,?,00A22E7F,?,?,?,00000000), ref: 00A23AC2
                                                                                                                                                                                                                      • Part of subcall function 00A8E199: GetFileAttributesW.KERNEL32(?,00A8CF95), ref: 00A8E19A
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A8D420
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A8D470
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A8D481
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A8D498
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A8D4A1
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                    • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                    • Opcode ID: 542e985f795ff5093c0825a834b47e98ff5ea9e57a9621cf568b98c8fc76824a
                                                                                                                                                                                                                    • Instruction ID: b1d1f66a9f1b4c8598684ed0dd89b0f4cdaacd6f32e81a1d32a3c804a094776b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 542e985f795ff5093c0825a834b47e98ff5ea9e57a9621cf568b98c8fc76824a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9C317031008355ABC704FF64D9518AFB7E8BEA1310F444E2DF4D5531A2EB30AA09CB63
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: __floor_pentium4
                                                                                                                                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                    • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                    • Opcode ID: 5233667b9b29c0dac61efe0ace9dae6e907e4a845cf43b4bcfdca5cf83b417a0
                                                                                                                                                                                                                    • Instruction ID: c0a0021447d865162a4ee723867d0aac640d5a7d9e6ac52e7c0d27d0b74bcb3e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5233667b9b29c0dac61efe0ace9dae6e907e4a845cf43b4bcfdca5cf83b417a0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 15C22971E046288FDB29CF289D407EAB7B5FB48306F1541EAD84DE7241E775AE898F40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A964DC
                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00A96639
                                                                                                                                                                                                                    • CoCreateInstance.OLE32(00ABFCF8,00000000,00000001,00ABFB68,?), ref: 00A96650
                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00A968D4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                    • String ID: .lnk
                                                                                                                                                                                                                    • API String ID: 886957087-24824748
                                                                                                                                                                                                                    • Opcode ID: 26bb3ceb41b605c51f3e73dac4ea84c447cc8e076120cc1f5cad5f77ed1f1ba2
                                                                                                                                                                                                                    • Instruction ID: 23c37660288c812ce1a19c871e9862f6ee37259585af80e809b4c98c196ad2ec
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 26bb3ceb41b605c51f3e73dac4ea84c447cc8e076120cc1f5cad5f77ed1f1ba2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CFD14871608211AFC704EF28D991D6BB7E9FF98704F04496DF5958B2A1DB30EE09CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 00AA22E8
                                                                                                                                                                                                                      • Part of subcall function 00A9E4EC: GetWindowRect.USER32(?,?), ref: 00A9E504
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00AA2312
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00AA2319
                                                                                                                                                                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00AA2355
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AA2381
                                                                                                                                                                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00AA23DF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2387181109-0
                                                                                                                                                                                                                    • Opcode ID: 9ae96098a84b3c0f8e70670d4083282da1623441a492b0920853e76154ab321f
                                                                                                                                                                                                                    • Instruction ID: 9e823680236635e60fd59c0422ae350d307bd5e17fd71c9981de7ae6dae45e60
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9ae96098a84b3c0f8e70670d4083282da1623441a492b0920853e76154ab321f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9631E272504315AFCB20DF58C845F5BB7A9FF86710F000A19F9859B191DB34E919CBA2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00A99B78
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00A99C8B
                                                                                                                                                                                                                      • Part of subcall function 00A93874: GetInputState.USER32 ref: 00A938CB
                                                                                                                                                                                                                      • Part of subcall function 00A93874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A93966
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00A99BA8
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00A99C75
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 1972594611-438819550
                                                                                                                                                                                                                    • Opcode ID: e1d0713d321e9e4c56cfd93fc387131a06d5fa492dff9434b50c5552997fc283
                                                                                                                                                                                                                    • Instruction ID: 9dafe798f524061c42ff2ca445bcffc1a2eed8ac04efd4a18d8fc159475410a1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e1d0713d321e9e4c56cfd93fc387131a06d5fa492dff9434b50c5552997fc283
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96415E71A0021AAFCF54DFA8DD85AEEBBF8EF05310F14456AE405A6191EB309E44CB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00A39A4E
                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00A39B23
                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00A39B36
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Color$LongProcWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3131106179-0
                                                                                                                                                                                                                    • Opcode ID: 7f840e09ad92d31042b16c0829233136e48ff9ab11a7764b7ac99eecdbbcbbff
                                                                                                                                                                                                                    • Instruction ID: 8f826aea2e7e2d127cb47d5ced3cfc55afa5f4653a851e1c56a110a1aca79be9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7f840e09ad92d31042b16c0829233136e48ff9ab11a7764b7ac99eecdbbcbbff
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1A14B71608504EEE728EB7C8D99EBF36ADDB42380F14C309F106C6696CAA59D02D272
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00AA304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00AA307A
                                                                                                                                                                                                                      • Part of subcall function 00AA304E: _wcslen.LIBCMT ref: 00AA309B
                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00AA185D
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1884
                                                                                                                                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00AA18DB
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA18E6
                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 00AA1915
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1601658205-0
                                                                                                                                                                                                                    • Opcode ID: 26a846d7ae494a8f9886eefe0916cb42c09f2fa07ed002a8b8e870b8a22cbdc2
                                                                                                                                                                                                                    • Instruction ID: 471ee7db56bd126ff765dbb65cdf888dffd5c3e2c5433bb0cd7482fbb6c90f38
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 26a846d7ae494a8f9886eefe0916cb42c09f2fa07ed002a8b8e870b8a22cbdc2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4A51B271A00210AFDB10EF68D986F6A77E5AB49718F048058F9066F3D3D775AD42CBE1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 292994002-0
                                                                                                                                                                                                                    • Opcode ID: 48fb52d803d0840574da073f9cfd9a8a65e57828f78f76804034b3ec17e20bd9
                                                                                                                                                                                                                    • Instruction ID: 735bc4e10ea5582d29849d6f9445a55f6ee987c1dcd7ab06e5e0d53b7a60aa16
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 48fb52d803d0840574da073f9cfd9a8a65e57828f78f76804034b3ec17e20bd9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B42194317402115FD7208F1AD864FAA7FA9EF86364F598068E845CB253D771DD42CB90
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                    • API String ID: 0-1546025612
                                                                                                                                                                                                                    • Opcode ID: a6b8b1afe949e01471f1128235fe462a5dafcd9324159a95b293c69978358759
                                                                                                                                                                                                                    • Instruction ID: 6c473b9f0a1334d2086862aa1c19bb57d2fe9e8ad7ba543ba1a9631a516ddbd9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a6b8b1afe949e01471f1128235fe462a5dafcd9324159a95b293c69978358759
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E2A27171E0162ACBDF24CF68D9507EDB7B1BF54310F2481AAE815AB285EB749D81CF90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00A8AAAC
                                                                                                                                                                                                                    • SetKeyboardState.USER32(00000080), ref: 00A8AAC8
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00A8AB36
                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00A8AB88
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 432972143-0
                                                                                                                                                                                                                    • Opcode ID: dc5a0154161eaddd9cafc58fe494c1ae00abe722b4c8334dc8233e4595cbaea7
                                                                                                                                                                                                                    • Instruction ID: 4682a6fe6cffbd73ae08e27c634338e7629a73f128bda73b49b4e9377244ffbb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc5a0154161eaddd9cafc58fe494c1ae00abe722b4c8334dc8233e4595cbaea7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 99310870A40648AEFF35EB64CC09BFA7BA6EB64320F04421BF5C1565E1D3758D91C762
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5BB7F
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • GetTimeZoneInformation.KERNEL32 ref: 00A5BB91
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,00AF121C,000000FF,?,0000003F,?,?), ref: 00A5BC09
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,?,00AF1270,000000FF,?,0000003F,?,?,?,00AF121C,000000FF,?,0000003F,?,?), ref: 00A5BC36
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 806657224-0
                                                                                                                                                                                                                    • Opcode ID: 59f49de8bdf65a315c0b0434d1887d4071cc17a358c812c2f9cdc8c41ea6c552
                                                                                                                                                                                                                    • Instruction ID: 4906d5ad74509078339d3925ab6eefd155aa55028fc070336a293d7b804d368d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 59f49de8bdf65a315c0b0434d1887d4071cc17a358c812c2f9cdc8c41ea6c552
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E931B270904245DFCB11DFE9DC809B9BBB8FF55762714466AE860EB2B1D7309D06CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 00A9CE89
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 00A9CEEA
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 00A9CEFE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 234945975-0
                                                                                                                                                                                                                    • Opcode ID: 0791890b794534da0dc0c775cfc2c8a47d1173eda81923bef5673c538d8b3e6d
                                                                                                                                                                                                                    • Instruction ID: 4735c87e7be77baf8a5565fffa2308cd3081a2c7823a1d6e154ed2e6715308bf
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0791890b794534da0dc0c775cfc2c8a47d1173eda81923bef5673c538d8b3e6d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CB21ACB1600B05ABEF20DFA5C988BA7B7FCEB50364F10482EE546D2152E770EE058B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A882AA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrlen
                                                                                                                                                                                                                    • String ID: ($|
                                                                                                                                                                                                                    • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                    • Opcode ID: b0310fac687d111a9ed8c987b8e787702b960c88e992a3613d54774bec50a16b
                                                                                                                                                                                                                    • Instruction ID: b845948e58c15b4e09fe665228b5bcaa1c95cf1ddd6d62f579f6adab98a087f0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b0310fac687d111a9ed8c987b8e787702b960c88e992a3613d54774bec50a16b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89323474A006059FCB28DF59C480AAAB7F0FF48710B55C56EE49ADB3A1EB74E981CB40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A95CC1
                                                                                                                                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00A95D17
                                                                                                                                                                                                                    • FindClose.KERNEL32(?), ref: 00A95D5F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3541575487-0
                                                                                                                                                                                                                    • Opcode ID: 1de76ee696e7bd0d86c6a1297021078b98a32dd53e4d7a4c73ae041bbdaa7183
                                                                                                                                                                                                                    • Instruction ID: 85502605f4a9b7f5ae35381d8bb5de792db4efdf82f583d3d1f93febdaae1da4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1de76ee696e7bd0d86c6a1297021078b98a32dd53e4d7a4c73ae041bbdaa7183
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00518B34B046019FCB14DF28D495E9AB7E4FF49324F14855DE95A8B3A2DB30ED05CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00A5271A
                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00A52724
                                                                                                                                                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00A52731
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3906539128-0
                                                                                                                                                                                                                    • Opcode ID: ad81d3db5aeec2af8c1e83cd92c9b8e7efa431a85d2196fd2bc6c83883086bd1
                                                                                                                                                                                                                    • Instruction ID: 2e056aee859652f8bead19cbe5f92b85941be3ff41305fcf91c47fd1d651b85c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad81d3db5aeec2af8c1e83cd92c9b8e7efa431a85d2196fd2bc6c83883086bd1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F31B5759112189BCB21DF64DD89BDDB7B8BF48310F5042EAE81CA7261E7309F858F45
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00A951DA
                                                                                                                                                                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A95238
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00A952A1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1682464887-0
                                                                                                                                                                                                                    • Opcode ID: c9d71c558a1a3c9b2de82e9fb248e19d9b7ee53b73a403580efbdb6dd4b65976
                                                                                                                                                                                                                    • Instruction ID: 379e6d231e43de667e6a2dce57b692fbcf3d7a8527bf2755d7c16efd721c526d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c9d71c558a1a3c9b2de82e9fb248e19d9b7ee53b73a403580efbdb6dd4b65976
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FA314F75A00518DFDB00DF94D885EADBBF4FF48314F048099E805AB362DB31E856CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A3FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00A40668
                                                                                                                                                                                                                      • Part of subcall function 00A3FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00A40685
                                                                                                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A8170D
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A8173A
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A8174A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 577356006-0
                                                                                                                                                                                                                    • Opcode ID: b5d7b889d0f86b3f53d872c0a4f0b959f6e7b25c061784655878ee60c52f3cb9
                                                                                                                                                                                                                    • Instruction ID: 9e2ac89f77205643db597cfd3d3ff100bd50f9884f2580b440d84904b974d511
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b5d7b889d0f86b3f53d872c0a4f0b959f6e7b25c061784655878ee60c52f3cb9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 47119EB2814304AFD718EF54DC8AD6AB7BDFF44764B20852EF05657651EB70BC428B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A8D608
                                                                                                                                                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00A8D645
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A8D650
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 33631002-0
                                                                                                                                                                                                                    • Opcode ID: d6cecdd3001582f52fef5360719ccdcda8481c1af0f0f514f6f3d8e987cba2cf
                                                                                                                                                                                                                    • Instruction ID: 9ccd2584fbbc15454cf6c0067e61f4e4bf51901366d0d0effb646018121828ad
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6cecdd3001582f52fef5360719ccdcda8481c1af0f0f514f6f3d8e987cba2cf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 66115E75E05228BFDB10DF99EC45FAFBBBCEB45B60F108225F904E7290D6704A058BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A8168C
                                                                                                                                                                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A816A1
                                                                                                                                                                                                                    • FreeSid.ADVAPI32(?), ref: 00A816B1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3429775523-0
                                                                                                                                                                                                                    • Opcode ID: 19e6274d5ef65963b37a6f25dddc0a3e9af9c4764a90b629bcbcdf6295b37f27
                                                                                                                                                                                                                    • Instruction ID: 67049e1d562dc4ffa0a9a5ad994d152af4cc12b4d660afdf86cb3cbeb11dddd3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19e6274d5ef65963b37a6f25dddc0a3e9af9c4764a90b629bcbcdf6295b37f27
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26F0F471950309FBDB00EFE49C89EAEBBBCFB08614F504565E501E2191E774AA458B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00A7D28C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: NameUser
                                                                                                                                                                                                                    • String ID: X64
                                                                                                                                                                                                                    • API String ID: 2645101109-893830106
                                                                                                                                                                                                                    • Opcode ID: 66e290418db9f42834b61a18dc68a3481e89680fa1df57346bb3f6463a0893e5
                                                                                                                                                                                                                    • Instruction ID: 2b178de94a262b13995a3d753e0fc6802037a2dd339f981401ed0b1321227e0c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 66e290418db9f42834b61a18dc68a3481e89680fa1df57346bb3f6463a0893e5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 96D0CAB480112DEBCB94DBA0EC88DDEB3BCBB04306F108292F50AA2001DB30964A8F20
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                    • Instruction ID: 4a9e658a86aa773e0aa275241e9cf77859cb88335db59d45ae27c10715775ec6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D6023C75E012199FDF54CFA9C9806ADFBF1EF88324F25816AD819E7380D731AE418B80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00A96918
                                                                                                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 00A96961
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                                                                                                    • Opcode ID: aaa6d8762365fe1e8aa3f23c3d391e0c83f6cd2df5d535e7a983a1ef900e11cc
                                                                                                                                                                                                                    • Instruction ID: 3c681137b2314191a21e109d4e3086258a31bdd82ad23592d8703682973ed7fe
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: aaa6d8762365fe1e8aa3f23c3d391e0c83f6cd2df5d535e7a983a1ef900e11cc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8C1190356042109FCB14DF69D484A1ABBE5FF89328F14C6A9E4698F6A2C730EC05CBD1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00AA4891,?,?,00000035,?), ref: 00A937E4
                                                                                                                                                                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00AA4891,?,?,00000035,?), ref: 00A937F4
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3479602957-0
                                                                                                                                                                                                                    • Opcode ID: c3f3f367ddfdfc61e712a4c55ba8b61e3845d9a083461ff16a6a5d7a6735446f
                                                                                                                                                                                                                    • Instruction ID: dd425820a23ff642a756a42eb217548cd76e5347a91bfcf61fffa81dc58d6354
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c3f3f367ddfdfc61e712a4c55ba8b61e3845d9a083461ff16a6a5d7a6735446f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 09F0E5B17042282AEB20A7A69D4DFEB7ABEEFC4775F000275F509D22A1D9609904C6B0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A8B25D
                                                                                                                                                                                                                    • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00A8B270
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InputSendkeybd_event
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3536248340-0
                                                                                                                                                                                                                    • Opcode ID: 4111e77ccc22dc8892f8b3da88235bcd9a95c54b720805f38b94ff652a8239ae
                                                                                                                                                                                                                    • Instruction ID: dbb620c949077b9569804e40d841ef7906f1a5b595104026d204541254af3b8a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4111e77ccc22dc8892f8b3da88235bcd9a95c54b720805f38b94ff652a8239ae
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D7F06D7080424DABDB05DFA0C805BEE7BB0FF04315F008009F951A51A2D37982019FA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A811FC), ref: 00A810D4
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,00A811FC), ref: 00A810E9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 81990902-0
                                                                                                                                                                                                                    • Opcode ID: 0a7f0c7edb4819933ef3c266fa5cb443fca8fc764bec9f2cced474b4cde5456c
                                                                                                                                                                                                                    • Instruction ID: a3fa7a0be2be8615000fd1b59a9ac5ce13955633e3167d2655dfa9aeb881e649
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0a7f0c7edb4819933ef3c266fa5cb443fca8fc764bec9f2cced474b4cde5456c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8DE04F32418600AFE7252B51FC09E7377E9EB04320F20892DF4A5804B1DB626C91DB10
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • Variable is not of type 'Object'., xrefs: 00A70C40
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                    • API String ID: 0-1840281001
                                                                                                                                                                                                                    • Opcode ID: f9ed902a0e4bbbad6b0be659fbd430b35a939839ab1961ebca30cf863aef4433
                                                                                                                                                                                                                    • Instruction ID: 0aff726d190e4c2fb60747146aafc5492ddc8855fe6986a7eccc124d643d3d9b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9ed902a0e4bbbad6b0be659fbd430b35a939839ab1961ebca30cf863aef4433
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 48328E70900228DFCF14DF98EA85FEDB7B5BF05354F148069E80AAB292D775AE45CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00A56766,?,?,00000008,?,?,00A5FEFE,00000000), ref: 00A56998
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExceptionRaise
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3997070919-0
                                                                                                                                                                                                                    • Opcode ID: f86f87b320f8e7d803a48056670b02a1f66b2679b915b2f5d1fbab05b67b20ff
                                                                                                                                                                                                                    • Instruction ID: 9ef7932b09eb20192ec37c12d7df79a6eb7e89ba22ae3d853d956f9a8c10ff8b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f86f87b320f8e7d803a48056670b02a1f66b2679b915b2f5d1fbab05b67b20ff
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 61B14932610608DFD715CF28C48AB657BB0FF45366F698658E999CF2A2C335E989CB40
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 0-3916222277
                                                                                                                                                                                                                    • Opcode ID: b752c38ab48e3510b35e13244badcd5bc5c0de18855f4b3b49ff562b828c247f
                                                                                                                                                                                                                    • Instruction ID: 032a823475cbc387cf87e0ad6932daad8601d00859a1198d0c2894e669c49324
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b752c38ab48e3510b35e13244badcd5bc5c0de18855f4b3b49ff562b828c247f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A8125F75E102299FCB14CF58C8816EEB7F5FF48710F14819AE949EB255DB349E81CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • BlockInput.USER32(00000001), ref: 00A9EABD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: BlockInput
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3456056419-0
                                                                                                                                                                                                                    • Opcode ID: 61ad69e55925e1cc7a285ab38748dee19adeb7ef700ea624d28a923009d1ef0a
                                                                                                                                                                                                                    • Instruction ID: 11ce740ed07e01e913058045b8299ef28aae2aec17db5b1a5396b8e3b3268e9a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 61ad69e55925e1cc7a285ab38748dee19adeb7ef700ea624d28a923009d1ef0a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 42E01A312102149FD710EF59E904E9AB7E9AF987B0F048426FC4ACB662DA70A8418BA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00A403EE), ref: 00A409DA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3192549508-0
                                                                                                                                                                                                                    • Opcode ID: 8d7cf8f8b2b68b5c04afd9cf8f684e2632d597f1119055c0485e1863d0b04adc
                                                                                                                                                                                                                    • Instruction ID: d07d8c83845f8fc4dc96fff000ad062af7d28c2cf35d5d4f1e0d95da3260594a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8d7cf8f8b2b68b5c04afd9cf8f684e2632d597f1119055c0485e1863d0b04adc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash:
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 0-4108050209
                                                                                                                                                                                                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                    • Instruction ID: e628b490e15d6155621316f4814eadb958c54d8774221d0d1b32ee04bfaeeca0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A151C97D60C7C99BDB788778895EBBE23D99BD2340F280919D882C7283C705DE85C352
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 44089d9a11ee6892cd43f76c389094165b5a78d1f2a7aebfa429ab20e462d382
                                                                                                                                                                                                                    • Instruction ID: a4e6df3c545198d76fde6988772d02a3627f97a6bd2dee25961b4efaf4b56370
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 44089d9a11ee6892cd43f76c389094165b5a78d1f2a7aebfa429ab20e462d382
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6B32F122D29F014DD7239635E822339A659AFB73C6F16D737E81AB59A5EF39C4834200
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 5e1e329779db702afe3e879922e07a33390c2132c407f52e88dc9380dfa4bd74
                                                                                                                                                                                                                    • Instruction ID: 8d81e134af1ea9fe8f94cee64c1d5baffed04ec2eeb5aa68e9294b31a9fed4e5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5e1e329779db702afe3e879922e07a33390c2132c407f52e88dc9380dfa4bd74
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B032D132A001558BDF28CB29CC9467D77B1EB45370F28C56EE88EAB292D635DD82DB41
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 362fe41cbba443e3bba4b73a6121964a0e2f44ccc915a4baa4bb1566bf6343f5
                                                                                                                                                                                                                    • Instruction ID: ba16054e1fb91d4df62742ddb7d62fde7e70d6812ce2ec37bead5eda2090b024
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 362fe41cbba443e3bba4b73a6121964a0e2f44ccc915a4baa4bb1566bf6343f5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C922BF70E0061ADFDF14CFA9D981AAEB3B2FF44300F244539E816AB291EB359E51CB50
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: d081fc81c07a47734bcf323bdc26983a2eaf7bc6a7bfca8accb6db2d027d9db5
                                                                                                                                                                                                                    • Instruction ID: 0123f411f8af1cf1dd65320a2a478d32fb51405322aac6f14bd7b9348997ca59
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d081fc81c07a47734bcf323bdc26983a2eaf7bc6a7bfca8accb6db2d027d9db5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F002B6B5E00216EFDF04DF54D981AAEB7B1FF54344F208169F8169B291EB31AE21CB91
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: c59a6ea00f01d7c9ef8f96e42b97ea04adb6d873a7f7a9e6c619e707d66d09f0
                                                                                                                                                                                                                    • Instruction ID: 93930a47f790423b739585809371ab5e95b960e51313e5c6ff70a120baac817b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c59a6ea00f01d7c9ef8f96e42b97ea04adb6d873a7f7a9e6c619e707d66d09f0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 13B10421E2AF814DD72396798831336B65C7FBB6D5F52D71BFC2678E22EB2285834140
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                    • Instruction ID: a2b0a6f177091ae8d76e31b2d92ac98edcd7923499d3c5cbb78c43863908ec7d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7A91667A6080E34ADB29473E857507EFFF15AD23A231A079ED4F2CA1C5FE249994D620
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                    • Instruction ID: 7eddc0a7437c4073d333743b34c3c653d5b4b79a1e5e1df7a11565f4df0082b8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9791647A2090A349DB69433D857453EFFF15AD23A135A079EE4F2CB1C5EE24C998E720
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                    • Instruction ID: f132e1a99daa54dbecc3fd24943a1235df6e812952e8bd26781bd29ee29e78b0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C91337A2090E34ADB6D477A857443EFFF19AD23A231A07ADD4F2CA1C1FE248595D620
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: cf4249e8196087ea06b98b7cba2006e3da1e33afb00b61df1845d994d9be65c5
                                                                                                                                                                                                                    • Instruction ID: 56187df7263369950ce552e8553481d096e73cca9955b7985e72ecaed8f18fee
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cf4249e8196087ea06b98b7cba2006e3da1e33afb00b61df1845d994d9be65c5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC618A7D2087C996DE349B288D95BBE63A4DFC1780F20092EE983DB281DB55DE43C356
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 257c7bccdfc65492db85b357e88cceed92c58def4baff96f280ce4ee06c92e83
                                                                                                                                                                                                                    • Instruction ID: 5d9e0f2e68d1b4c313371cfaf62b8b9a1e30501af0c2ba45d37797225b90ac6b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 257c7bccdfc65492db85b357e88cceed92c58def4baff96f280ce4ee06c92e83
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4961CD3DA1C7C967CE389B285D52BBF2394DFC2704F200A59E943DB281DB16DD428B51
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                    • Instruction ID: e8decc76f7ff8cd5eb4f538773a0d1da2f7dab3ac3f9d154f0c07a50781c6593
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9481743A6090E349DB6D477A857443EFFE15AD23A131A079DD4F2CB1C2FE24C594E620
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 2eb22348b9eb5ffe8823734ac05d8e2ab14af3344a761b11eb8b444b0cc61c8e
                                                                                                                                                                                                                    • Instruction ID: 51c4cc0350b92a7cc58165b3de044686642a76295a61e85fff4650012f4dbe49
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2eb22348b9eb5ffe8823734ac05d8e2ab14af3344a761b11eb8b444b0cc61c8e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5E2193327206158BDB28CFB9C82277A73E5A754320F15862EE4A7C37D1DE35AD04CB80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AA2B30
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AA2B43
                                                                                                                                                                                                                    • DestroyWindow.USER32 ref: 00AA2B52
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00AA2B6D
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00AA2B74
                                                                                                                                                                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00AA2CA3
                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00AA2CB1
                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2CF8
                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00AA2D04
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00AA2D40
                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2D62
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2D75
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2D80
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00AA2D89
                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2D98
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00AA2DA1
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2DA8
                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00AA2DB3
                                                                                                                                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2DC5
                                                                                                                                                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00ABFC38,00000000), ref: 00AA2DDB
                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00AA2DEB
                                                                                                                                                                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00AA2E11
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00AA2E30
                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA2E52
                                                                                                                                                                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AA303F
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                    • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                    • Opcode ID: 7b580078bdcf7660efd83b59bd526679736fdf8d2717c88ad9ba4aa9ed0e9a91
                                                                                                                                                                                                                    • Instruction ID: 0474eb0e2a99774575c827c303f23f3eb37eab4adb6142abec48d2a6dec2ac4a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7b580078bdcf7660efd83b59bd526679736fdf8d2717c88ad9ba4aa9ed0e9a91
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B5026C75500215EFDB14DFA8DD89EAE7BB9FB49720F008258F915AB2A1DB70ED01CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00AB712F
                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00AB7160
                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00AB716C
                                                                                                                                                                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00AB7186
                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00AB7195
                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00AB71C0
                                                                                                                                                                                                                    • GetSysColor.USER32(00000010), ref: 00AB71C8
                                                                                                                                                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00AB71CF
                                                                                                                                                                                                                    • FrameRect.USER32(?,?,00000000), ref: 00AB71DE
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AB71E5
                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00AB7230
                                                                                                                                                                                                                    • FillRect.USER32(?,?,?), ref: 00AB7262
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB7284
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: GetSysColor.USER32(00000012), ref: 00AB7421
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: SetTextColor.GDI32(?,?), ref: 00AB7425
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: GetSysColorBrush.USER32(0000000F), ref: 00AB743B
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: GetSysColor.USER32(0000000F), ref: 00AB7446
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: GetSysColor.USER32(00000011), ref: 00AB7463
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00AB7471
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: SelectObject.GDI32(?,00000000), ref: 00AB7482
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: SetBkColor.GDI32(?,00000000), ref: 00AB748B
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: SelectObject.GDI32(?,?), ref: 00AB7498
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00AB74B7
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00AB74CE
                                                                                                                                                                                                                      • Part of subcall function 00AB73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00AB74DB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4124339563-0
                                                                                                                                                                                                                    • Opcode ID: 606fccff87fb86769a6061aac07965b4741c46e86498a433fb4815c1a5c296b9
                                                                                                                                                                                                                    • Instruction ID: a01d14db16e879cae82b151d64b987dae00ce690f641eb628ab5796d70162e21
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 606fccff87fb86769a6061aac07965b4741c46e86498a433fb4815c1a5c296b9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0EA16072008301AFD711DFA4DC48E9F7BA9FB89330F100B19F9A2A61B2D775E9459B61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?), ref: 00A38E14
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A76AC5
                                                                                                                                                                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A76AFE
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A76F43
                                                                                                                                                                                                                      • Part of subcall function 00A38F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A38BE8,?,00000000,?,?,?,?,00A38BBA,00000000,?), ref: 00A38FC5
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001053), ref: 00A76F7F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A76F96
                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A76FAC
                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00A76FB7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                    • Opcode ID: 3c7367901eb211b2268a5cd25721c371166407f7065769598ab51be404d9dda8
                                                                                                                                                                                                                    • Instruction ID: 044510039f6bc2b08e1badcc56f16e973e35402927b6b92f44f3fbf9170650e3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3c7367901eb211b2268a5cd25721c371166407f7065769598ab51be404d9dda8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1B128B30200A01DFDB25DF64CD94BAABBB5FB45310F24C569F4898B262CB79EC52CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000), ref: 00AA273E
                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00AA286A
                                                                                                                                                                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00AA28A9
                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00AA28B9
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00AA2900
                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00AA290C
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00AA2955
                                                                                                                                                                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00AA2964
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00AA2974
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00AA2978
                                                                                                                                                                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00AA2988
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AA2991
                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00AA299A
                                                                                                                                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00AA29C6
                                                                                                                                                                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00AA29DD
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00AA2A1D
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00AA2A31
                                                                                                                                                                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00AA2A42
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00AA2A77
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00AA2A82
                                                                                                                                                                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00AA2A8D
                                                                                                                                                                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00AA2A97
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                    • API String ID: 2910397461-517079104
                                                                                                                                                                                                                    • Opcode ID: ef0afd8702877ace699d1a01f3673573903430c4d1caa09cb978a8b144f10fa9
                                                                                                                                                                                                                    • Instruction ID: 6b33423ed6990f78269bc1066c4ebe7de356f268b6a213b55f50b9c04d68c3ac
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ef0afd8702877ace699d1a01f3673573903430c4d1caa09cb978a8b144f10fa9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B0B15C71A00215AFEB14DFA8DD49FAE7BA9EB09710F004614F915EB2E1D774ED41CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00A94AED
                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?,00ABCB68,?,\\.\,00ABCC08), ref: 00A94BCA
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,00ABCB68,?,\\.\,00ABCC08), ref: 00A94D36
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                    • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                    • Opcode ID: 4e63cc0a0dd178158e34588de4aadd9ba01ba67085102ab9745681bbc3e2209b
                                                                                                                                                                                                                    • Instruction ID: 787d0c3aa8db77bc68e9217b39ba2cf0261d8fcd3ee8866e1ae11aac2f1d01d5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4e63cc0a0dd178158e34588de4aadd9ba01ba67085102ab9745681bbc3e2209b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7861BF30705155AFCF08EF29CAC1D6DB7F0BB5C788B244865F806AB292DA35ED42DB41
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSysColor.USER32(00000012), ref: 00AB7421
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 00AB7425
                                                                                                                                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00AB743B
                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00AB7446
                                                                                                                                                                                                                    • CreateSolidBrush.GDI32(?), ref: 00AB744B
                                                                                                                                                                                                                    • GetSysColor.USER32(00000011), ref: 00AB7463
                                                                                                                                                                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00AB7471
                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00AB7482
                                                                                                                                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00AB748B
                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00AB7498
                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00AB74B7
                                                                                                                                                                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00AB74CE
                                                                                                                                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00AB74DB
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00AB752A
                                                                                                                                                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00AB7554
                                                                                                                                                                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00AB7572
                                                                                                                                                                                                                    • DrawFocusRect.USER32(?,?), ref: 00AB757D
                                                                                                                                                                                                                    • GetSysColor.USER32(00000011), ref: 00AB758E
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00AB7596
                                                                                                                                                                                                                    • DrawTextW.USER32(?,00AB70F5,000000FF,?,00000000), ref: 00AB75A8
                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00AB75BF
                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00AB75CA
                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00AB75D0
                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00AB75D5
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 00AB75DB
                                                                                                                                                                                                                    • SetBkColor.GDI32(?,?), ref: 00AB75E5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1996641542-0
                                                                                                                                                                                                                    • Opcode ID: 17f713a5ef171b6985bbdb94946785f9bc672d5cf4fb85bdcad221511f705596
                                                                                                                                                                                                                    • Instruction ID: e17d321274dd1bc5fe62f362b4dbbbfe288f0d72d382fb3d3ce9c18ae19fd12d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 17f713a5ef171b6985bbdb94946785f9bc672d5cf4fb85bdcad221511f705596
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E9616F72904218AFDF11DFA8DC49EEE7FB9EB48320F104215F911BB2A2D7749941DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB1128
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00AB113D
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00AB1144
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB1199
                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00AB11B9
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00AB11ED
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00AB120B
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00AB121D
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00AB1232
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00AB1245
                                                                                                                                                                                                                    • IsWindowVisible.USER32(00000000), ref: 00AB12A1
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00AB12BC
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00AB12D0
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00AB12E8
                                                                                                                                                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00AB130E
                                                                                                                                                                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00AB1328
                                                                                                                                                                                                                    • CopyRect.USER32(?,?), ref: 00AB133F
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00AB13AA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                    • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                    • API String ID: 698492251-4156429822
                                                                                                                                                                                                                    • Opcode ID: 161a2373768e2b565d749a878c355e689f2af06edac8b214a3aae5096688da8d
                                                                                                                                                                                                                    • Instruction ID: afe63b3abe7459835ae1d5f86a0183677eb96c4fa5e2b62dbfc10d4b7963982e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 161a2373768e2b565d749a878c355e689f2af06edac8b214a3aae5096688da8d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B2B19D71604351AFD700DF68D994FAABBE8FF84350F408A1CF9999B262D731E845CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A38968
                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00A38970
                                                                                                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00A3899B
                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00A389A3
                                                                                                                                                                                                                    • GetSystemMetrics.USER32(00000004), ref: 00A389C8
                                                                                                                                                                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00A389E5
                                                                                                                                                                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00A389F5
                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00A38A28
                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00A38A3C
                                                                                                                                                                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 00A38A5A
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00A38A76
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A38A81
                                                                                                                                                                                                                      • Part of subcall function 00A3912D: GetCursorPos.USER32(?), ref: 00A39141
                                                                                                                                                                                                                      • Part of subcall function 00A3912D: ScreenToClient.USER32(00000000,?), ref: 00A3915E
                                                                                                                                                                                                                      • Part of subcall function 00A3912D: GetAsyncKeyState.USER32(00000001), ref: 00A39183
                                                                                                                                                                                                                      • Part of subcall function 00A3912D: GetAsyncKeyState.USER32(00000002), ref: 00A3919D
                                                                                                                                                                                                                    • SetTimer.USER32(00000000,00000000,00000028,00A390FC), ref: 00A38AA8
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                    • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                    • API String ID: 1458621304-248962490
                                                                                                                                                                                                                    • Opcode ID: fcb44dac3b1861eb8b2223df450e4fd7e1a1d01242a36e430221a90852ca2f5f
                                                                                                                                                                                                                    • Instruction ID: a8c33dbc24bae7a343c6287370b619aba2496fe4a8cee7c10bc0bd55f5c8fa88
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fcb44dac3b1861eb8b2223df450e4fd7e1a1d01242a36e430221a90852ca2f5f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 14B16D71A00209EFDB14DFA8CD85FAE3BB5FB48354F108229FA15A72A0DB74E841CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A81114
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81120
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A8112F
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81136
                                                                                                                                                                                                                      • Part of subcall function 00A810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A8114D
                                                                                                                                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A80DF5
                                                                                                                                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A80E29
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00A80E40
                                                                                                                                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00A80E7A
                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A80E96
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00A80EAD
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00A80EB5
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00A80EBC
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A80EDD
                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000), ref: 00A80EE4
                                                                                                                                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A80F13
                                                                                                                                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A80F35
                                                                                                                                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A80F47
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80F6E
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80F75
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80F7E
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80F85
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A80F8E
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80F95
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00A80FA1
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A80FA8
                                                                                                                                                                                                                      • Part of subcall function 00A81193: GetProcessHeap.KERNEL32(00000008,00A80BB1,?,00000000,?,00A80BB1,?), ref: 00A811A1
                                                                                                                                                                                                                      • Part of subcall function 00A81193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00A80BB1,?), ref: 00A811A8
                                                                                                                                                                                                                      • Part of subcall function 00A81193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00A80BB1,?), ref: 00A811B7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4175595110-0
                                                                                                                                                                                                                    • Opcode ID: 6ccead57786e5465b8cc8dc2e716561aa0f27c4c5fae9af4da31dd1b03acbd76
                                                                                                                                                                                                                    • Instruction ID: bc3d2fcbc9ecb0abe1f7a682d261e38c29872cf45dc5003c7f855999e687c7f8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6ccead57786e5465b8cc8dc2e716561aa0f27c4c5fae9af4da31dd1b03acbd76
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4D715E7190021AABDF60EFA4DD44FAEBBB8BF04351F148215FA19E6192D7319D09CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AAC4BD
                                                                                                                                                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00ABCC08,00000000,?,00000000,?,?), ref: 00AAC544
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00AAC5A4
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAC5F4
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AAC66F
                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00AAC6B2
                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00AAC7C1
                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00AAC84D
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00AAC881
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AAC88E
                                                                                                                                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00AAC960
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                    • API String ID: 9721498-966354055
                                                                                                                                                                                                                    • Opcode ID: 4d9b9e484d73d9803734e9b243d80327be4384092beba07ebd350d1a4ce3b05c
                                                                                                                                                                                                                    • Instruction ID: 8ddf2a0a1e15d3a8ec187ccffefb24a6af6257f2159a90b4130a72bbd1e50adb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4d9b9e484d73d9803734e9b243d80327be4384092beba07ebd350d1a4ce3b05c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F126A356042119FDB14DF18D981E2AB7E5FF89724F04886CF88A9B3A2DB35ED41CB81
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00AB09C6
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB0A01
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00AB0A54
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB0A8A
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB0B06
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB0B81
                                                                                                                                                                                                                      • Part of subcall function 00A3F9F2: _wcslen.LIBCMT ref: 00A3F9FD
                                                                                                                                                                                                                      • Part of subcall function 00A82BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A82BFA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                    • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                    • Opcode ID: f33f525177080b04ccab25e5c4aa8b232f19d2321dc8d6802a35d0264a0962b3
                                                                                                                                                                                                                    • Instruction ID: e1ea25909d4fc22af26ec722b167393489650097c6504acf1b39dcdc26744008
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f33f525177080b04ccab25e5c4aa8b232f19d2321dc8d6802a35d0264a0962b3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 85E189312083519FC714EF28C5509AEB7E5BF98354F14896DF896AB3A2DB30EE45CB81
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                    • API String ID: 1256254125-909552448
                                                                                                                                                                                                                    • Opcode ID: 9d5a4fd7e7906ded5070b555621f9c66cd530355510d8c59a369904131def3e2
                                                                                                                                                                                                                    • Instruction ID: ea00565659708ce4a76f83133332dcfe3bc7bb403a960edbb828ba2f8f4e0814
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9d5a4fd7e7906ded5070b555621f9c66cd530355510d8c59a369904131def3e2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF71E83260016A8BEB10DF7DCD516BF33A2AB667B4F150529F8669B2C5E731CD45C3A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB835A
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB836E
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB8391
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB83B4
                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00AB83F2
                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00AB361A,?), ref: 00AB844E
                                                                                                                                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00AB8487
                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00AB84CA
                                                                                                                                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00AB8501
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00AB850D
                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00AB851D
                                                                                                                                                                                                                    • DestroyIcon.USER32(?), ref: 00AB852C
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00AB8549
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00AB8555
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                    • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                    • API String ID: 799131459-1154884017
                                                                                                                                                                                                                    • Opcode ID: 45f071a330159e5d082d6940eddd51cc269477a91f62279b1174b0888f91c51e
                                                                                                                                                                                                                    • Instruction ID: 67a1fabdab967af83a49735df385d814366a7356c7f6b6f76e936ebe6253d09a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45f071a330159e5d082d6940eddd51cc269477a91f62279b1174b0888f91c51e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B461E071540215BAEB24DF68CC81FFE77ACBB08B20F104609F815D61D2DF78AA81C7A0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                    • API String ID: 0-1645009161
                                                                                                                                                                                                                    • Opcode ID: 7669af807d038a56a1e4c5e94562f2a776fa1d5b5a684c22da166ac88781ee19
                                                                                                                                                                                                                    • Instruction ID: caa1246800192cc85bfd1a12e9fa129a86bb7bff23458528fcdb74fb8491f246
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7669af807d038a56a1e4c5e94562f2a776fa1d5b5a684c22da166ac88781ee19
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3B81F371A04225BFDB24AF79ED42FAE37B8BF56300F044434F904AA192EB74DA41C7A1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharLowerBuffW.USER32(?,?), ref: 00A93EF8
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A93F03
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A93F5A
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A93F98
                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?), ref: 00A93FD6
                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A9401E
                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A94059
                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A94087
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                    • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                    • Opcode ID: 972c23c6b05e0fc458da1dcdb8e7281dde6e2fb49ed5e85c8796962ad802b1bd
                                                                                                                                                                                                                    • Instruction ID: 653836e9dd9110bc86ffaaa9fdd9716876bad77b8ce190219c9b4931f1e04669
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 972c23c6b05e0fc458da1dcdb8e7281dde6e2fb49ed5e85c8796962ad802b1bd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B771BF326042119FCB10EF28D98196AB7F4EFA8764F10492DF89697251EB31EE46CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadIconW.USER32(00000063), ref: 00A85A2E
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A85A40
                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00A85A57
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00A85A6C
                                                                                                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00A85A72
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00A85A82
                                                                                                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00A85A88
                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A85AA9
                                                                                                                                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A85AC3
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A85ACC
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A85B33
                                                                                                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00A85B6F
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00A85B75
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00A85B7C
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00A85BD3
                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00A85BE0
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 00A85C05
                                                                                                                                                                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A85C2F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 895679908-0
                                                                                                                                                                                                                    • Opcode ID: ebf4e24091f3410bd952691ec6a41f9fe931da594862ff705c1b08aee695fff9
                                                                                                                                                                                                                    • Instruction ID: 1cfdc9cf59f10b425fc83103b9210ac39cfa849274117fd7e2b0fc599b20065e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ebf4e24091f3410bd952691ec6a41f9fe931da594862ff705c1b08aee695fff9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3B715D31900B05AFDB20EFB8CE89EAEBBF5FF48714F104618E582A65A0D775E945CB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F89), ref: 00A9FE27
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F8A), ref: 00A9FE32
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00A9FE3D
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F03), ref: 00A9FE48
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F8B), ref: 00A9FE53
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F01), ref: 00A9FE5E
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F81), ref: 00A9FE69
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F88), ref: 00A9FE74
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F80), ref: 00A9FE7F
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F86), ref: 00A9FE8A
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F83), ref: 00A9FE95
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F85), ref: 00A9FEA0
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F82), ref: 00A9FEAB
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F84), ref: 00A9FEB6
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F04), ref: 00A9FEC1
                                                                                                                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 00A9FECC
                                                                                                                                                                                                                    • GetCursorInfo.USER32(?), ref: 00A9FEDC
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A9FF1E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3215588206-0
                                                                                                                                                                                                                    • Opcode ID: 8e172a8e22305366d01aaa6f70e8a8bb61b199cec1e0eb9e18a24b831e2a51ff
                                                                                                                                                                                                                    • Instruction ID: 9437b8405c84d264cb3363723ba6726288eae8b1b2ba6499162dddd1eaed7b96
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e172a8e22305366d01aaa6f70e8a8bb61b199cec1e0eb9e18a24b831e2a51ff
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1E4144B0E043196EDB10DFBA8C89C5EBFE8FF04754B50452AE11DEB291DB789901CE91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00A400C6
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00AF070C,00000FA0,6AF5FDE1,?,?,?,?,00A623B3,000000FF), ref: 00A4011C
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00A623B3,000000FF), ref: 00A40127
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00A623B3,000000FF), ref: 00A40138
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00A4014E
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00A4015C
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00A4016A
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A40195
                                                                                                                                                                                                                      • Part of subcall function 00A400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00A401A0
                                                                                                                                                                                                                    • ___scrt_fastfail.LIBCMT ref: 00A400E7
                                                                                                                                                                                                                      • Part of subcall function 00A400A3: __onexit.LIBCMT ref: 00A400A9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • InitializeConditionVariable, xrefs: 00A40148
                                                                                                                                                                                                                    • kernel32.dll, xrefs: 00A40133
                                                                                                                                                                                                                    • WakeAllConditionVariable, xrefs: 00A40162
                                                                                                                                                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00A40122
                                                                                                                                                                                                                    • SleepConditionVariableCS, xrefs: 00A40154
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 66158676-1714406822
                                                                                                                                                                                                                    • Opcode ID: f842e9ebb57393d52512a5bf7af40006d59d1ee93a54477917520ead71f8ca83
                                                                                                                                                                                                                    • Instruction ID: 9bbaacf2f84d639c34aede7c2b002c03f59f76891a7791d7ffedc607db0a8925
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f842e9ebb57393d52512a5bf7af40006d59d1ee93a54477917520ead71f8ca83
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9221F936A447107FEB10ABE8BD45F697398EB84F61F140725FA01A62A3DBB498019A90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                    • API String ID: 176396367-1603158881
                                                                                                                                                                                                                    • Opcode ID: 45f98f4987e861b7eccc4306e1f776f3cf6ee877ace5b048561fa07afdc6e812
                                                                                                                                                                                                                    • Instruction ID: d9775cab35a0edf8881bad0924aaa2ad9d118ceb48db0a790332152e374d1173
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45f98f4987e861b7eccc4306e1f776f3cf6ee877ace5b048561fa07afdc6e812
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D3E1A633E00516AFCF18AFB8C8517EEBBB5BF54B10F548129E456B7240EB70AE859790
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharLowerBuffW.USER32(00000000,00000000,00ABCC08), ref: 00A94527
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A9453B
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A94599
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A945F4
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A9463F
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A946A7
                                                                                                                                                                                                                      • Part of subcall function 00A3F9F2: _wcslen.LIBCMT ref: 00A3F9FD
                                                                                                                                                                                                                    • GetDriveTypeW.KERNEL32(?,00AE6BF0,00000061), ref: 00A94743
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                    • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                    • Opcode ID: e84a3e538fb6673da72610c0ce2a8124d7776b03e4a4cfe9709555fdcde2702c
                                                                                                                                                                                                                    • Instruction ID: 1fe9533f848927f93161c770f904b99769ee6c1db4a5744a036e7ca518a4d699
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e84a3e538fb6673da72610c0ce2a8124d7776b03e4a4cfe9709555fdcde2702c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 07B10F716083129FCB10DF28C990E6AB7E5BFA9760F10492DF196C7291E730DC46CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,00ABCC08), ref: 00AA40BB
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00AA40CD
                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00ABCC08), ref: 00AA40F2
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,00ABCC08), ref: 00AA413E
                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028,?,00ABCC08), ref: 00AA41A8
                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(00000009), ref: 00AA4262
                                                                                                                                                                                                                    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00AA42C8
                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 00AA42F2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                    • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 354098117-199464113
                                                                                                                                                                                                                    • Opcode ID: 6b7234255da04e8200ca3abbe2650f2a8b2bb8fed900a823e11af2ea3cec7b8c
                                                                                                                                                                                                                    • Instruction ID: 50c2818951b64e4199aeef64c7c72c72cd7a88b3652a98b9195a6266a104b2b5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6b7234255da04e8200ca3abbe2650f2a8b2bb8fed900a823e11af2ea3cec7b8c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 88124C75A00215EFDB14CF94C884EAEBBB5FF8A314F248098F9059B291D771ED46CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00AF1990), ref: 00A62F8D
                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00AF1990), ref: 00A6303D
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00A63081
                                                                                                                                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00A6308A
                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(00AF1990,00000000,?,00000000,00000000,00000000), ref: 00A6309D
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A630A9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 36266755-4108050209
                                                                                                                                                                                                                    • Opcode ID: 230c8c178e42cb3ad286ebf2687b1569f71f7ba5238e471e62bdadc2cf61e4f3
                                                                                                                                                                                                                    • Instruction ID: 65d67f723d02f926e7413b4059ad254db96039ef15a10e0240eae400cca5af29
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 230c8c178e42cb3ad286ebf2687b1569f71f7ba5238e471e62bdadc2cf61e4f3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A1711671640616BEEB219F68DC49FEABF79FF05324F204216F5246A1E1C7B1A920CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000,?), ref: 00AB6DEB
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00AB6E5F
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00AB6E81
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00AB6E94
                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00AB6EB5
                                                                                                                                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00A20000,00000000), ref: 00AB6EE4
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00AB6EFD
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00AB6F16
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000), ref: 00AB6F1D
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00AB6F35
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00AB6F4D
                                                                                                                                                                                                                      • Part of subcall function 00A39944: GetWindowLongW.USER32(?,000000EB), ref: 00A39952
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                    • String ID: 0$tooltips_class32
                                                                                                                                                                                                                    • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                    • Opcode ID: 7d8f3c685f64f649ff7f5da30a5830bcbc33bd139fc70becd6b0c0774071ff8e
                                                                                                                                                                                                                    • Instruction ID: be6c4b9c756d36f2197fbfecd666ac9ebf632fc02724d8c544b0bc40a95d242e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7d8f3c685f64f649ff7f5da30a5830bcbc33bd139fc70becd6b0c0774071ff8e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 07716671504244AFDB21CF68DC98FBABBE9FB89314F04091DF98987262C778E906CB11
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00AB9147
                                                                                                                                                                                                                      • Part of subcall function 00AB7674: ClientToScreen.USER32(?,?), ref: 00AB769A
                                                                                                                                                                                                                      • Part of subcall function 00AB7674: GetWindowRect.USER32(?,?), ref: 00AB7710
                                                                                                                                                                                                                      • Part of subcall function 00AB7674: PtInRect.USER32(?,?,00AB8B89), ref: 00AB7720
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00AB91B0
                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00AB91BB
                                                                                                                                                                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00AB91DE
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00AB9225
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00AB923E
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00AB9255
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00AB9277
                                                                                                                                                                                                                    • DragFinish.SHELL32(?), ref: 00AB927E
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00AB9371
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                    • API String ID: 221274066-3440237614
                                                                                                                                                                                                                    • Opcode ID: 1b58b78507d1e2efa554996d98d737517214938451df21df7a1a0843f1fdb038
                                                                                                                                                                                                                    • Instruction ID: fba8a4218b4378ac5899c7e5b7ad117a8d0f077125170ddaa05d0a0b1520c04e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b58b78507d1e2efa554996d98d737517214938451df21df7a1a0843f1fdb038
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F8616A71108301AFC701DFA4DD85DAFBBE9FF89750F000A2EF595921A2DB709A49CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A9C4B0
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A9C4C3
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A9C4D7
                                                                                                                                                                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A9C4F0
                                                                                                                                                                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00A9C533
                                                                                                                                                                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A9C549
                                                                                                                                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A9C554
                                                                                                                                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A9C584
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00A9C5DC
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00A9C5F0
                                                                                                                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00A9C5FB
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                    • Opcode ID: a9532a5a1ea7a8ec6967ac71428d70cc32a5cf5dd5f08d0cb2f64b099bd4b84a
                                                                                                                                                                                                                    • Instruction ID: 91ca2232abeddd6d8eb2cbc479cbac7f3ea44a0845d21bf4f275f050b2efae13
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a9532a5a1ea7a8ec6967ac71428d70cc32a5cf5dd5f08d0cb2f64b099bd4b84a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DE515BB0640A08BFEF21DFA4C988EAB7BFCFF48764F004519F94696211DB34E9459B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00AB8592
                                                                                                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00AB85A2
                                                                                                                                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00AB85AD
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AB85BA
                                                                                                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00AB85C8
                                                                                                                                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00AB85D7
                                                                                                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00AB85E0
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AB85E7
                                                                                                                                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00AB85F8
                                                                                                                                                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00ABFC38,?), ref: 00AB8611
                                                                                                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00AB8621
                                                                                                                                                                                                                    • GetObjectW.GDI32(?,00000018,000000FF), ref: 00AB8641
                                                                                                                                                                                                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00AB8671
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AB8699
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00AB86AF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3840717409-0
                                                                                                                                                                                                                    • Opcode ID: 167d77a39214ce00538e1b54746ec61caee50049496db14e33053ddf18df97f5
                                                                                                                                                                                                                    • Instruction ID: 7c8458a858f26954ab780529f78a98f910791cde06485252e31879c35db6ae83
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 167d77a39214ce00538e1b54746ec61caee50049496db14e33053ddf18df97f5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 05410975600205AFDB11DFA9DC48EAA7BBCFF89721F104259F905E7262DB349902CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00A91502
                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00A9150B
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A91517
                                                                                                                                                                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A915FB
                                                                                                                                                                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 00A91657
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00A91708
                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 00A9178C
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A917D8
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A917E7
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00A91823
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                    • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                    • Opcode ID: f5a5ae912ace14533e9f87dd0841ba4a7fc25566d080ae1041a265f0f007a47b
                                                                                                                                                                                                                    • Instruction ID: 876d3e5f61f8d8be3bd0fc6578eb584f7262b06e5c54f36a3c49aedd8ef359ae
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f5a5ae912ace14533e9f87dd0841ba4a7fc25566d080ae1041a265f0f007a47b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 83D1DD31B00216EBDF009FA5E989B79B7F5BF44700F128166F446AB291DB30ED42DBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AAB6AE,?,?), ref: 00AAC9B5
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AAC9F1
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA68
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA9E
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AAB6F4
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AAB772
                                                                                                                                                                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 00AAB80A
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00AAB87E
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00AAB89C
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00AAB8F2
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00AAB904
                                                                                                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00AAB922
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00AAB983
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AAB994
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                    • API String ID: 146587525-4033151799
                                                                                                                                                                                                                    • Opcode ID: 6189bc1848d0aa596b6fd01e4cdecc9e86b132bc756a5d2a12aad8bf547fed07
                                                                                                                                                                                                                    • Instruction ID: c9c09227bc2e1e31263ab7a51b7858a7d10c8bc2315cfdbc482d42e2ed8eee4f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6189bc1848d0aa596b6fd01e4cdecc9e86b132bc756a5d2a12aad8bf547fed07
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8EC19D30218201AFD714DF18C594F2ABBE5BF89318F14856CF49A4B2A3CB75EC46CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00AA25D8
                                                                                                                                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00AA25E8
                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 00AA25F4
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00AA2601
                                                                                                                                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00AA266D
                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00AA26AC
                                                                                                                                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00AA26D0
                                                                                                                                                                                                                    • SelectObject.GDI32(?,?), ref: 00AA26D8
                                                                                                                                                                                                                    • DeleteObject.GDI32(?), ref: 00AA26E1
                                                                                                                                                                                                                    • DeleteDC.GDI32(?), ref: 00AA26E8
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00AA26F3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                    • String ID: (
                                                                                                                                                                                                                    • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                    • Opcode ID: 22430df5d2e8b8ccbbe0143a2155ccb77a8ce4bf39345e255cc646c3cd4684ef
                                                                                                                                                                                                                    • Instruction ID: 8fea150df9119f96526345d684f8b7be95cb66b7701b24c376a89aa7e0dcbb0c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 22430df5d2e8b8ccbbe0143a2155ccb77a8ce4bf39345e255cc646c3cd4684ef
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3261E075D00219EFCF04CFE8D984EAEBBB5FF48310F208529E955A7261E770A9518FA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ___free_lconv_mon.LIBCMT ref: 00A5DAA1
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D659
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D66B
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D67D
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D68F
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6A1
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6B3
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6C5
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6D7
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6E9
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D6FB
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D70D
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D71F
                                                                                                                                                                                                                      • Part of subcall function 00A5D63C: _free.LIBCMT ref: 00A5D731
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DA96
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DAB8
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DACD
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DAD8
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DAFA
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB0D
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB1B
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB26
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB5E
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB65
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB82
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5DB9A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 161543041-0
                                                                                                                                                                                                                    • Opcode ID: e643f756d19e4d7db6e93c4a51efc997b1301ad021b8c7ff8f599e5cf6431e61
                                                                                                                                                                                                                    • Instruction ID: f99f45ac45f42fb3bef381289d1513b081ff9353b47a31b3126db8fd9a35c86c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e643f756d19e4d7db6e93c4a51efc997b1301ad021b8c7ff8f599e5cf6431e61
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1314A31604705DFEB31AB39E945B9A77E9FF41352F154419F849E7292DA31AC88C720
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00A8369C
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A836A7
                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A83797
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00A8380C
                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 00A8385D
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A83882
                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00A838A0
                                                                                                                                                                                                                    • ScreenToClient.USER32(00000000), ref: 00A838A7
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00A83921
                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00A8395D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                    • String ID: %s%u
                                                                                                                                                                                                                    • API String ID: 4010501982-679674701
                                                                                                                                                                                                                    • Opcode ID: 1427885f81e4a1afb6649d2d0cfa33c123d36a5961f2d87a45479fd923862c64
                                                                                                                                                                                                                    • Instruction ID: d4faceaba823abed580bdf8e5b82ad0f8f6c11e57345c62927069c02b33a8238
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1427885f81e4a1afb6649d2d0cfa33c123d36a5961f2d87a45479fd923862c64
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C91E672204706AFDB14EF64C895FEAF7A8FF44B10F004629F999C2191EB30EA45CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00A84994
                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00A849DA
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A849EB
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 00A849F7
                                                                                                                                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 00A84A2C
                                                                                                                                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00A84A64
                                                                                                                                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00A84A9D
                                                                                                                                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00A84AE6
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00A84B20
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A84B8B
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                    • String ID: ThumbnailClass
                                                                                                                                                                                                                    • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                    • Opcode ID: 6f8c7ff7078c6fcc95d55cce1a3a2094a4e83b1db2560a6ef17018b02754acb3
                                                                                                                                                                                                                    • Instruction ID: 8adc46305e36f909c8899181e556941e23f6db1103dd355eb249921cfaf33d1e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6f8c7ff7078c6fcc95d55cce1a3a2094a4e83b1db2560a6ef17018b02754acb3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6491D2714042069FDB04EF54C985FAABBE8FF88354F04856AFD859A096EB30ED45CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(00AF1990,000000FF,00000000,00000030), ref: 00A8BFAC
                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(00AF1990,00000004,00000000,00000030), ref: 00A8BFE1
                                                                                                                                                                                                                    • Sleep.KERNEL32(000001F4), ref: 00A8BFF3
                                                                                                                                                                                                                    • GetMenuItemCount.USER32(?), ref: 00A8C039
                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00A8C056
                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,-00000001), ref: 00A8C082
                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,?), ref: 00A8C0C9
                                                                                                                                                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A8C10F
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A8C124
                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A8C145
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                    • Opcode ID: 3632e3ea9ad1a2170c69185932b35f0ca5ac96e4f068ee880ec17ca215e47483
                                                                                                                                                                                                                    • Instruction ID: 9a9602613256ef09c6bcbce17c44240ff0e2647daa651aebc72376d6bd01aa64
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3632e3ea9ad1a2170c69185932b35f0ca5ac96e4f068ee880ec17ca215e47483
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 446180B090024AAFDF21EFA4DD88EAE7BB8EB05364F104255E951A7292C735AD15CF70
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00AACC64
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00AACC8D
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00AACD48
                                                                                                                                                                                                                      • Part of subcall function 00AACC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00AACCAA
                                                                                                                                                                                                                      • Part of subcall function 00AACC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00AACCBD
                                                                                                                                                                                                                      • Part of subcall function 00AACC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00AACCCF
                                                                                                                                                                                                                      • Part of subcall function 00AACC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00AACD05
                                                                                                                                                                                                                      • Part of subcall function 00AACC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00AACD28
                                                                                                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00AACCF3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                    • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                    • Opcode ID: 95c8ecc6e0f32be7260179c4e59c8353decc6423a1a980dc7142a08fc0c976c2
                                                                                                                                                                                                                    • Instruction ID: e6ce79b9bd3425458c1f795535fa40275a6617ddb8433137f55d13d947876160
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 95c8ecc6e0f32be7260179c4e59c8353decc6423a1a980dc7142a08fc0c976c2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA318271901128BBE720DB95DC88EFFBB7CEF16760F000265B905E3251D7749A469AB0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A93D40
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A93D6D
                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A93D9D
                                                                                                                                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A93DBE
                                                                                                                                                                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00A93DCE
                                                                                                                                                                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A93E55
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00A93E60
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00A93E6B
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                    • String ID: :$\$\??\%s
                                                                                                                                                                                                                    • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                    • Opcode ID: 3d2fd299137adb7c0a6cb01cf7bc4a7d0e3dba36a8e77bcc7524fedab678d39e
                                                                                                                                                                                                                    • Instruction ID: 508e797fb49fc793a8f1bd366495d847189e99b582d27b8b25821096b5878bd6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3d2fd299137adb7c0a6cb01cf7bc4a7d0e3dba36a8e77bcc7524fedab678d39e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D4318C76A04209ABDF20DBA0DC49FEB77FCAF88710F1041A5F619D6061EB7097458B24
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • timeGetTime.WINMM ref: 00A8E6B4
                                                                                                                                                                                                                      • Part of subcall function 00A3E551: timeGetTime.WINMM(?,?,00A8E6D4), ref: 00A3E555
                                                                                                                                                                                                                    • Sleep.KERNEL32(0000000A), ref: 00A8E6E1
                                                                                                                                                                                                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00A8E705
                                                                                                                                                                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A8E727
                                                                                                                                                                                                                    • SetActiveWindow.USER32 ref: 00A8E746
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A8E754
                                                                                                                                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A8E773
                                                                                                                                                                                                                    • Sleep.KERNEL32(000000FA), ref: 00A8E77E
                                                                                                                                                                                                                    • IsWindow.USER32 ref: 00A8E78A
                                                                                                                                                                                                                    • EndDialog.USER32(00000000), ref: 00A8E79B
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                    • String ID: BUTTON
                                                                                                                                                                                                                    • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                    • Opcode ID: ce540c2f1f4eee9f7ab9acbf2a79f632f30765617f90d7b8fcb3e9449fbd8f49
                                                                                                                                                                                                                    • Instruction ID: 805eacb5edff03015e8e348dd20f97ed1df74be393a9351a4b2d888cd18a1f78
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce540c2f1f4eee9f7ab9acbf2a79f632f30765617f90d7b8fcb3e9449fbd8f49
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 072129B1200245EFEB50EFE0EC89F363B69E754B59B101635F515C21B2EAA2AC12DB24
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A8EA5D
                                                                                                                                                                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A8EA73
                                                                                                                                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A8EA84
                                                                                                                                                                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A8EA96
                                                                                                                                                                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A8EAA7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: SendString$_wcslen
                                                                                                                                                                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                    • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                    • Opcode ID: 2c9dab6f2a9bdf1565d1ca74190b6bf5b396d96ee898f8a91d0f1745682d5d00
                                                                                                                                                                                                                    • Instruction ID: 08cfc45e4fccd5ad29b85502a7b9c439fa3fe7b5ca65e1fc130fae36a1440b56
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2c9dab6f2a9bdf1565d1ca74190b6bf5b396d96ee898f8a91d0f1745682d5d00
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B11423165026979D724E7A6DD4ADFFAA7CFBD1F80F000C25B411A20D1DA700945C6B0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 00A8A012
                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 00A8A07D
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00A8A09D
                                                                                                                                                                                                                    • GetKeyState.USER32(000000A0), ref: 00A8A0B4
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00A8A0E3
                                                                                                                                                                                                                    • GetKeyState.USER32(000000A1), ref: 00A8A0F4
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00A8A120
                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 00A8A12E
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00A8A157
                                                                                                                                                                                                                    • GetKeyState.USER32(00000012), ref: 00A8A165
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00A8A18E
                                                                                                                                                                                                                    • GetKeyState.USER32(0000005B), ref: 00A8A19C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: State$Async$Keyboard
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 541375521-0
                                                                                                                                                                                                                    • Opcode ID: bc8d879dabdbf3d1e66fd458a6b974505e95e0028c5e6841dcdbbf0318af8440
                                                                                                                                                                                                                    • Instruction ID: e9320944d6c0f7d34c6193d04682ead5be19bc9d056092abd93e155eb0d35a09
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bc8d879dabdbf3d1e66fd458a6b974505e95e0028c5e6841dcdbbf0318af8440
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5751AB3090478829FB35FBA08915BEBBFB55F21340F0C869AD5C6571C3EA54AE4CC762
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00A85CE2
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00A85CFB
                                                                                                                                                                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00A85D59
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00A85D69
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00A85D7B
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00A85DCF
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00A85DDD
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00A85DEF
                                                                                                                                                                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00A85E31
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00A85E44
                                                                                                                                                                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A85E5A
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00A85E67
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3096461208-0
                                                                                                                                                                                                                    • Opcode ID: 1ca6ea0049dd88c3cd4d962f343bf7b4999ab260b8a202c18e33550512ac82b7
                                                                                                                                                                                                                    • Instruction ID: 42a98cfc11ec43b8e9da064eeab2f1d8d4b3576a90130eb1916c4c5cb5609abe
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1ca6ea0049dd88c3cd4d962f343bf7b4999ab260b8a202c18e33550512ac82b7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 62511C70E00609AFDF18DFA8CD99EAEBBB5FB48310F148229F915E6291D7709E05CB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A38F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00A38BE8,?,00000000,?,?,?,?,00A38BBA,00000000,?), ref: 00A38FC5
                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00A38C81
                                                                                                                                                                                                                    • KillTimer.USER32(00000000,?,?,?,?,00A38BBA,00000000,?), ref: 00A38D1B
                                                                                                                                                                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00A76973
                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00A38BBA,00000000,?), ref: 00A769A1
                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00A38BBA,00000000,?), ref: 00A769B8
                                                                                                                                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00A38BBA,00000000), ref: 00A769D4
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00A769E6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 641708696-0
                                                                                                                                                                                                                    • Opcode ID: ce58e534cf93deef9826119605c6914946aad13da96e9e0972a3155ea0ef7292
                                                                                                                                                                                                                    • Instruction ID: 9b91ad15ba6fc9367570bfbaa2f6e5abe59b25668f8ed08b211746eae21e0618
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce58e534cf93deef9826119605c6914946aad13da96e9e0972a3155ea0ef7292
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D3617B31502B00DFCB25DFA5DE58B26B7F1FB50352F149518F0469B960CB79AD82CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39944: GetWindowLongW.USER32(?,000000EB), ref: 00A39952
                                                                                                                                                                                                                    • GetSysColor.USER32(0000000F), ref: 00A39862
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ColorLongWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 259745315-0
                                                                                                                                                                                                                    • Opcode ID: 7c0f2fca4f9def9336232c8d49ef5b5152b700afd64fdefc1c605d17cf8bf29b
                                                                                                                                                                                                                    • Instruction ID: 0c88915028beac52d414be5c67db1edacf11d90a033d15544070495157fe618d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7c0f2fca4f9def9336232c8d49ef5b5152b700afd64fdefc1c605d17cf8bf29b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D5419131104644AFDB209F7CAC84BBB7BA5AB46331F148715F9A6972F2D7B19C42DB10
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00A6F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00A89717
                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,00A6F7F8,00000001), ref: 00A89720
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00A6F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00A89742
                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,00A6F7F8,00000001), ref: 00A89745
                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00A89866
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                    • API String ID: 747408836-2268648507
                                                                                                                                                                                                                    • Opcode ID: cf64673a73c04d6a8a9bc0733cefd185a4621a06e85435fa8f11ada10a9147c6
                                                                                                                                                                                                                    • Instruction ID: 28a97b87eee41f637b1fb00e8913b46b69de6e5b51785dab30b2a78c5eb9622a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cf64673a73c04d6a8a9bc0733cefd185a4621a06e85435fa8f11ada10a9147c6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D2412872800229AACF04FBE4EE86EEFB779AF15740F140535F60576092EA356F49CB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A807A2
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A807BE
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A807DA
                                                                                                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A80804
                                                                                                                                                                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00A8082C
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A80837
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A8083C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                    • API String ID: 323675364-22481851
                                                                                                                                                                                                                    • Opcode ID: 6c8739f86586ce8986b88d9f4ad441be3051fe1f648db4d2ac113c20c43defaf
                                                                                                                                                                                                                    • Instruction ID: 170971e68d5de973115a4b448c4452822a3a78142ae217329ae78aa3aa1caf1c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6c8739f86586ce8986b88d9f4ad441be3051fe1f648db4d2ac113c20c43defaf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 90411772C10229ABCF15EFA8ED85CEEB778BF04750F044529E911A7161EB309E48CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00AB403B
                                                                                                                                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 00AB4042
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00AB4055
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00AB405D
                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00AB4068
                                                                                                                                                                                                                    • DeleteDC.GDI32(00000000), ref: 00AB4072
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00AB407C
                                                                                                                                                                                                                    • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00AB4092
                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00AB409E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                    • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                    • Opcode ID: 87988060916b146874141ca9ecf0df9567d4700f374774645a4fef5e19ae90b9
                                                                                                                                                                                                                    • Instruction ID: ace944e7dd38667171fdec83aa9c453cc928ce738327f7a99e34acd39307b7d2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 87988060916b146874141ca9ecf0df9567d4700f374774645a4fef5e19ae90b9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81315A32501219BBDF21AFA8DC09FEA3B6CEF0D320F110311FA55A61A2C779D851DBA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00AA3C5C
                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00AA3C8A
                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00AA3C94
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AA3D2D
                                                                                                                                                                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00AA3DB1
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00AA3ED5
                                                                                                                                                                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00AA3F0E
                                                                                                                                                                                                                    • CoGetObject.OLE32(?,00000000,00ABFB98,?), ref: 00AA3F2D
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00AA3F40
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00AA3FC4
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AA3FD8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 429561992-0
                                                                                                                                                                                                                    • Opcode ID: d5f88a76917715b2f5672ead042cf1949baa0f372c41f0126efe9438467e8809
                                                                                                                                                                                                                    • Instruction ID: 5df5eca81ab3125cbf7d4250b232647ba42c7e519d523acc0925ac5e62f157e0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d5f88a76917715b2f5672ead042cf1949baa0f372c41f0126efe9438467e8809
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0CC146726083019FDB00DF68C98492BB7E9FF8A754F14491DF98A9B261D731EE05CB52
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00A97AF3
                                                                                                                                                                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A97B8F
                                                                                                                                                                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 00A97BA3
                                                                                                                                                                                                                    • CoCreateInstance.OLE32(00ABFD08,00000000,00000001,00AE6E6C,?), ref: 00A97BEF
                                                                                                                                                                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A97C74
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00A97CCC
                                                                                                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00A97D57
                                                                                                                                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A97D7A
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00A97D81
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00A97DD6
                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00A97DDC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2762341140-0
                                                                                                                                                                                                                    • Opcode ID: d917b17e00f3cc2b7295a646f0d2067826227f23f87aa830ced36d5fea68db37
                                                                                                                                                                                                                    • Instruction ID: ccf002ccb4288397edfdf76536e282eb16db11e33c0f9c0c8ac05c8c406fa94e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d917b17e00f3cc2b7295a646f0d2067826227f23f87aa830ced36d5fea68db37
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98C11D75A04115AFCB14DFA8C884DAEBBF5FF48314B1485A9F4169B262D730EE45CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00AB5504
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AB5515
                                                                                                                                                                                                                    • CharNextW.USER32(00000158), ref: 00AB5544
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00AB5585
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00AB559B
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AB55AC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$CharNext
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1350042424-0
                                                                                                                                                                                                                    • Opcode ID: e8829ed80815a0280812cc4cf9121214e5fef67f6c99f2e9b0b24bcd67620c15
                                                                                                                                                                                                                    • Instruction ID: 14234071087ffba5d726f7d9dfa3aa52645900b0c16e2d0ea84fcc5b3f9f12a3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e8829ed80815a0280812cc4cf9121214e5fef67f6c99f2e9b0b24bcd67620c15
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E4615C31D04608AFDB20DFA4CC85EFE7BBDEB09725F108145F525AA2A2D7749A81DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A7FAAF
                                                                                                                                                                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 00A7FB08
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00A7FB1A
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A7FB3A
                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00A7FB8D
                                                                                                                                                                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A7FBA1
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A7FBB6
                                                                                                                                                                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00A7FBC3
                                                                                                                                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A7FBCC
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A7FBDE
                                                                                                                                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A7FBE9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2706829360-0
                                                                                                                                                                                                                    • Opcode ID: 5fac28a2c965225dfd1027358c8fe8c865261af3a4e5624f00fbb2b9ec163744
                                                                                                                                                                                                                    • Instruction ID: 67d5305d49504efd080a9449a23d760a007e2918188f0fe0b071c5668b8d4e3d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5fac28a2c965225dfd1027358c8fe8c865261af3a4e5624f00fbb2b9ec163744
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C414435A00219DFCB04DFA8DC58DADBBB9EF48354F00C565E955A7261C730AA46CFA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 00A89CA1
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00A89D22
                                                                                                                                                                                                                    • GetKeyState.USER32(000000A0), ref: 00A89D3D
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00A89D57
                                                                                                                                                                                                                    • GetKeyState.USER32(000000A1), ref: 00A89D6C
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00A89D84
                                                                                                                                                                                                                    • GetKeyState.USER32(00000011), ref: 00A89D96
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00A89DAE
                                                                                                                                                                                                                    • GetKeyState.USER32(00000012), ref: 00A89DC0
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00A89DD8
                                                                                                                                                                                                                    • GetKeyState.USER32(0000005B), ref: 00A89DEA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: State$Async$Keyboard
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 541375521-0
                                                                                                                                                                                                                    • Opcode ID: 6122e50f2ffd13b0fd29c66173fea52150e5380a6608b4098efa76d16e6f0992
                                                                                                                                                                                                                    • Instruction ID: 5c4cb68337d7c667de12e88239865efd0411075f06daa3317e71c9a52f61371e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6122e50f2ffd13b0fd29c66173fea52150e5380a6608b4098efa76d16e6f0992
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6C41D874A047C96DFF31A760C8047B7BEE06F11344F0C815ADAC6565C2DBA599C8C7A6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00AA05BC
                                                                                                                                                                                                                    • inet_addr.WSOCK32(?), ref: 00AA061C
                                                                                                                                                                                                                    • gethostbyname.WSOCK32(?), ref: 00AA0628
                                                                                                                                                                                                                    • IcmpCreateFile.IPHLPAPI ref: 00AA0636
                                                                                                                                                                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00AA06C6
                                                                                                                                                                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00AA06E5
                                                                                                                                                                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 00AA07B9
                                                                                                                                                                                                                    • WSACleanup.WSOCK32 ref: 00AA07BF
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                    • String ID: Ping
                                                                                                                                                                                                                    • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                    • Opcode ID: cfaf06697f18846881908e2efb26916321b2cf98df28ce4d6d9d5a6e531e9d37
                                                                                                                                                                                                                    • Instruction ID: 6dca6b1362b08a33271297369aeeb41823c96cac17afea5be8faa234392a8c06
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cfaf06697f18846881908e2efb26916321b2cf98df28ce4d6d9d5a6e531e9d37
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E891AF35A046019FD320CF19D588F1ABBE0AF4A318F1485A9F46A9B7A2C770FD45CF91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                    • API String ID: 707087890-567219261
                                                                                                                                                                                                                    • Opcode ID: 9550327cb4d0b72b8a987b5d855fa57ee88639e992d8b7a3b476db56688d20a4
                                                                                                                                                                                                                    • Instruction ID: 35fc12bb5e5212ee9a5b3c6b8c618ea9793bfcebf74e6ce37c495ff55fbb3392
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9550327cb4d0b72b8a987b5d855fa57ee88639e992d8b7a3b476db56688d20a4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8B51A231A00126DBCF24DF6CC9509BEB7A5BF66724B244229E826E72C5EF39DD41C790
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CoInitialize.OLE32 ref: 00AA3774
                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00AA377F
                                                                                                                                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00ABFB78,?), ref: 00AA37D9
                                                                                                                                                                                                                    • IIDFromString.OLE32(?,?), ref: 00AA384C
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00AA38E4
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AA3936
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                    • API String ID: 636576611-1287834457
                                                                                                                                                                                                                    • Opcode ID: 9d5d79cbafcd08c74e44d94b149ceff0a229a5f8038bda4883146e59bae35746
                                                                                                                                                                                                                    • Instruction ID: 049a218fb68ba0e4c68c3a6fe98ca17dfec7530fa930f3711a7f004f722419f6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9d5d79cbafcd08c74e44d94b149ceff0a229a5f8038bda4883146e59bae35746
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3561C072608311AFD710DF54D948F6AB7E8EF4A710F100919F9859B291D774EE48CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A933CF
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A933F0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LoadString$_wcslen
                                                                                                                                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                    • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                    • Opcode ID: f2d174140341999aa570185a4ee8142a2975d19fbf57ea2781dd2c86201598eb
                                                                                                                                                                                                                    • Instruction ID: 47019a4800ef9e7f893e33fb014c822e04dce777684086bd48a2462af1709250
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2d174140341999aa570185a4ee8142a2975d19fbf57ea2781dd2c86201598eb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4051AA72900219BACF14EBE4EE46EEEB7B8AF18740F144575F005760A2EB312F58DB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                    • API String ID: 1256254125-769500911
                                                                                                                                                                                                                    • Opcode ID: f5be47d9f3de302247dbe379982f0665fcf5711f3b4b59a444f3f2afc0ff8f26
                                                                                                                                                                                                                    • Instruction ID: 8dadffe2b7e36af769f4ad672573f3929106f479d9eb52842ce99be47c48b106
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f5be47d9f3de302247dbe379982f0665fcf5711f3b4b59a444f3f2afc0ff8f26
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A941D532A111279BCB207F7D89905BE77B5BFA47A4B244639E461DB284F731CD82C7A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00A953A0
                                                                                                                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A95416
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A95420
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00A954A7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                    • API String ID: 4194297153-14809454
                                                                                                                                                                                                                    • Opcode ID: c6b49cc582ee2817c0d38709bb1fe7c9988a77f6f52b0c332f1a8b2e2039fa13
                                                                                                                                                                                                                    • Instruction ID: c039077d34d431da03517bfdc976f019cf9f1007746814c0cb4120d9921d1da1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c6b49cc582ee2817c0d38709bb1fe7c9988a77f6f52b0c332f1a8b2e2039fa13
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF319F39F006049FDB52DF68C986AAABBF5EF84305F148065E405DB2A2D731DD82CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateMenu.USER32 ref: 00AB3C79
                                                                                                                                                                                                                    • SetMenu.USER32(?,00000000), ref: 00AB3C88
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AB3D10
                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00AB3D24
                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00AB3D2E
                                                                                                                                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00AB3D5B
                                                                                                                                                                                                                    • DrawMenuBar.USER32 ref: 00AB3D63
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                    • String ID: 0$F
                                                                                                                                                                                                                    • API String ID: 161812096-3044882817
                                                                                                                                                                                                                    • Opcode ID: 0912c3c4e3ec1ba60e1aef1ff2e0edd42f4dde701148d4bb6b82065a79101c99
                                                                                                                                                                                                                    • Instruction ID: 714e4087b6894403f671af078df2e4817ca9ec335a6543499a562464c99ccda8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0912c3c4e3ec1ba60e1aef1ff2e0edd42f4dde701148d4bb6b82065a79101c99
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA416C75A01209EFDF24CFA4D884EEA7BB9FF49350F140529F94697362D770AA11CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00A81F64
                                                                                                                                                                                                                    • GetDlgCtrlID.USER32 ref: 00A81F6F
                                                                                                                                                                                                                    • GetParent.USER32 ref: 00A81F8B
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A81F8E
                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 00A81F97
                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00A81FAB
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A81FAE
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 711023334-1403004172
                                                                                                                                                                                                                    • Opcode ID: abf00c7e52552fe9f525c05803abca83a8881de93793f15c1df91cb20c620e97
                                                                                                                                                                                                                    • Instruction ID: 6743cae5ee01b72e6b59f9a5a0962f6fb5836f64f04c43df36a31601c228ca13
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: abf00c7e52552fe9f525c05803abca83a8881de93793f15c1df91cb20c620e97
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9521C275D00214BBCF04EFA4DC95DEEBBB8EF09310F000216FA61672A1DB785909DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00A82043
                                                                                                                                                                                                                    • GetDlgCtrlID.USER32 ref: 00A8204E
                                                                                                                                                                                                                    • GetParent.USER32 ref: 00A8206A
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A8206D
                                                                                                                                                                                                                    • GetDlgCtrlID.USER32(?), ref: 00A82076
                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00A8208A
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A8208D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 711023334-1403004172
                                                                                                                                                                                                                    • Opcode ID: 63858dec7d9a9d2796e6650b5f751a73e532b860ad43437f2f7c845d15fc336a
                                                                                                                                                                                                                    • Instruction ID: 00624dec85ef4fad30e552bde7b2a812a2d4452b9e2a4da6f128ca7b5d9fdb79
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63858dec7d9a9d2796e6650b5f751a73e532b860ad43437f2f7c845d15fc336a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0F21CFB5D00218BBCF10EFA4DC95EFEBBB8AF09310F004416B951A71A2DA794919DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00AB3A9D
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00AB3AA0
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB3AC7
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00AB3AEA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00AB3B62
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00AB3BAC
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00AB3BC7
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00AB3BE2
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00AB3BF6
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00AB3C13
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 312131281-0
                                                                                                                                                                                                                    • Opcode ID: 320b547fe23e0bedb70748f7fe57964e9b151222d8ce2bbcd17821ebbc4ad15e
                                                                                                                                                                                                                    • Instruction ID: 651c5b29361c4049467a2515cd24ad907a66d7ea183e7fbd938bac5ab2d0c0fe
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 320b547fe23e0bedb70748f7fe57964e9b151222d8ce2bbcd17821ebbc4ad15e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BE618B75900248AFDB10DFA8CD81EEE77B8EF09700F100199FA15E72A2C7B4AE46DB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00A8B151
                                                                                                                                                                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B165
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00A8B16C
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B17B
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A8B18D
                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B1A6
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B1B8
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B1FD
                                                                                                                                                                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B212
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00A8A1E1,?,00000001), ref: 00A8B21D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2156557900-0
                                                                                                                                                                                                                    • Opcode ID: f8839eaf368b547b8dcd773dd83f2711cf48cfac9a6a4c859cf61e54577c9335
                                                                                                                                                                                                                    • Instruction ID: 06cf3cf781b6586d2fcebb023c7c6596b38008a984f2bac066d109ee02cacd9f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f8839eaf368b547b8dcd773dd83f2711cf48cfac9a6a4c859cf61e54577c9335
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A0318EB2510214AFDB10EFE4DC58FBD7BA9BB51321F104116FA06D61A1EBB4AA42CF74
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52C94
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CA0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CAB
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CB6
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CC1
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CCC
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CD7
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CE2
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CED
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52CFB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                    • Opcode ID: 7ae5672dc7f13af31cd2267a9d39bb5143e275cf0f37cd2b3e65cfd481077f80
                                                                                                                                                                                                                    • Instruction ID: 31464829559725c07f0e0382298f2c5198229a0da033ae746ff132e279ac2185
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7ae5672dc7f13af31cd2267a9d39bb5143e275cf0f37cd2b3e65cfd481077f80
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98119376100108EFCB02EF54DA82EDD3BA5FF46351F5144A5FE48AB322DA31EE549B90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A97FAD
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A97FC1
                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00A97FEB
                                                                                                                                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00A98005
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A98017
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00A98060
                                                                                                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A980B0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                    • String ID: *.*
                                                                                                                                                                                                                    • API String ID: 769691225-438819550
                                                                                                                                                                                                                    • Opcode ID: fc88a543ae274acdeab772513f1cd0438d60008a2f60cb13b1b533d7675746e6
                                                                                                                                                                                                                    • Instruction ID: 36bd9889bfdf1733b550a9ee27819d58b176a64ce8e0c8922955f4205d4a8733
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fc88a543ae274acdeab772513f1cd0438d60008a2f60cb13b1b533d7675746e6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BD81A0726182019BCF24EF18C9449AEB3E8BF89710F544C6EF885D7251EB34DD45CBA2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00A25C7A
                                                                                                                                                                                                                      • Part of subcall function 00A25D0A: GetClientRect.USER32(?,?), ref: 00A25D30
                                                                                                                                                                                                                      • Part of subcall function 00A25D0A: GetWindowRect.USER32(?,?), ref: 00A25D71
                                                                                                                                                                                                                      • Part of subcall function 00A25D0A: ScreenToClient.USER32(?,?), ref: 00A25D99
                                                                                                                                                                                                                    • GetDC.USER32 ref: 00A646F5
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A64708
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00A64716
                                                                                                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00A6472B
                                                                                                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00A64733
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A647C4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                    • String ID: U
                                                                                                                                                                                                                    • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                    • Opcode ID: f3e11da1007a03530b67737d70593810b06062b7b309188589b776e3bd52ef9f
                                                                                                                                                                                                                    • Instruction ID: f31063bc08eff80d6a58bfcabf52d8cfb3ddabd55618dae0a1ea551c889579e7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f3e11da1007a03530b67737d70593810b06062b7b309188589b776e3bd52ef9f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CC71CF35900205DFCF21CFA8C984AFA7BB5FF4A360F144269ED555A2A6D7319C41DF60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00A935E4
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • LoadStringW.USER32(00AF2390,?,00000FFF,?), ref: 00A9360A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LoadString$_wcslen
                                                                                                                                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                    • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                    • Opcode ID: f80a289dbe5adb5938d85851b739be9848a809d85b3155d717185784435a8d76
                                                                                                                                                                                                                    • Instruction ID: c91bdb5d5523a3cb7ae476e7778ad2491d618346db91cae949b7577b1c79e022
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f80a289dbe5adb5938d85851b739be9848a809d85b3155d717185784435a8d76
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 94517C72D0021ABACF14EBE4EE42EEEBB78AF14740F044525F105760A2EB301B99DF61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A9C272
                                                                                                                                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A9C29A
                                                                                                                                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00A9C2CA
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A9C322
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?), ref: 00A9C336
                                                                                                                                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00A9C341
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                    • Opcode ID: 83ca42c640fc9c7f161c932b76231af724b903ca3964ede87f46153f749a8093
                                                                                                                                                                                                                    • Instruction ID: a4791cd7cecc9ccfe22f4eec014e1fa0f53f8b7bc66874c27937406580ec5765
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 83ca42c640fc9c7f161c932b76231af724b903ca3964ede87f46153f749a8093
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 35319CB1600B08AFDB21DFA48D88EABBBFCEB49760B10851EF44697211DB30DD459B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00A63AAF,?,?,Bad directive syntax error,00ABCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00A898BC
                                                                                                                                                                                                                    • LoadStringW.USER32(00000000,?,00A63AAF,?), ref: 00A898C3
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00A89987
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                    • API String ID: 858772685-4153970271
                                                                                                                                                                                                                    • Opcode ID: f22c6a058e19cfa71adf9bf0708220fd011c465c34c6e9ddb949320e7f4faa53
                                                                                                                                                                                                                    • Instruction ID: a7942e3692021dc5416cc68fc562e74505a208bb53d5a45af778cf132ac5b776
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f22c6a058e19cfa71adf9bf0708220fd011c465c34c6e9ddb949320e7f4faa53
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9A217C32C0021ABFCF11EF90DD06EEE7739BF28700F084829F515660A2EB719A18DB21
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetParent.USER32 ref: 00A820AB
                                                                                                                                                                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00A820C0
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A8214D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                    • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                    • Opcode ID: 28e5419e8aa04adac152b9baa3899f43d6a5518e8052f706487723c0c2d6d1fe
                                                                                                                                                                                                                    • Instruction ID: a0efffdfd5dcc8fb01f23366666754af8ba9fb7a5992e25735d4503a1df3df9d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 28e5419e8aa04adac152b9baa3899f43d6a5518e8052f706487723c0c2d6d1fe
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3311CA7AA84706B9F6017731EC0AEB6379CEB09764B301226F704A51E2FEA558425714
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 2d63ea9d31443dffea450494b61deaed0d0604d49c18eaad058e705c23b36ef2
                                                                                                                                                                                                                    • Instruction ID: 69d1f250121386dd8f12311081cae10b1130737bf8f8fd471c33807d67cd4567
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2d63ea9d31443dffea450494b61deaed0d0604d49c18eaad058e705c23b36ef2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ACC1DE74A04249EFDF11DFE8C845BAEBBB0BF49312F044199FC15AB292C774994ACB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1282221369-0
                                                                                                                                                                                                                    • Opcode ID: f0e5eee40f872fd633052dd11acbe69cff8770701f8a5532bf4fdba464f5e07a
                                                                                                                                                                                                                    • Instruction ID: d1e2fe31986b51c323a98ba8fbbcc5b0fff4c601e25936a66b61931d0daa973d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f0e5eee40f872fd633052dd11acbe69cff8770701f8a5532bf4fdba464f5e07a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17610071A04300AFDB21AFF4D981BAE7BA5BF06322F04416DFD45A7286E631990DC7A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00AB5186
                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000000), ref: 00AB51C7
                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000005,?,00000000), ref: 00AB51CD
                                                                                                                                                                                                                    • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00AB51D1
                                                                                                                                                                                                                      • Part of subcall function 00AB6FBA: DeleteObject.GDI32(00000000), ref: 00AB6FE6
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB520D
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00AB521A
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00AB524D
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00AB5287
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00AB5296
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3210457359-0
                                                                                                                                                                                                                    • Opcode ID: f9420ecd1d3e5388e9dc7ad99e994e5de9aadda1c8b36bf1868a3f49c96e59f9
                                                                                                                                                                                                                    • Instruction ID: 6482eb310a09ab88532764cdbc1e9ebd3cfb8722b8e97c0fac1b89b2eacfa029
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f9420ecd1d3e5388e9dc7ad99e994e5de9aadda1c8b36bf1868a3f49c96e59f9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3519330E42A08BFEF24AF78EC46FD97B69FB05321F144212F515962E2C7B59990DB40
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00A76890
                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00A768A9
                                                                                                                                                                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A768B9
                                                                                                                                                                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00A768D1
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A768F2
                                                                                                                                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00A38874,00000000,00000000,00000000,000000FF,00000000), ref: 00A76901
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A7691E
                                                                                                                                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00A38874,00000000,00000000,00000000,000000FF,00000000), ref: 00A7692D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1268354404-0
                                                                                                                                                                                                                    • Opcode ID: 960a8b237d07faee86cfe7abc82b0cfc6cf2e79a23c4547e80557d81f65b7941
                                                                                                                                                                                                                    • Instruction ID: 3be291b98daa30128eae292e457953e1c3bff355482c5ce9f04a88e682e08b51
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 960a8b237d07faee86cfe7abc82b0cfc6cf2e79a23c4547e80557d81f65b7941
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7A518B7060070AEFDB20CF64CC95FAABBB5EB48760F108618F956972A0DB74E951DB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A9C182
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A9C195
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?), ref: 00A9C1A9
                                                                                                                                                                                                                      • Part of subcall function 00A9C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A9C272
                                                                                                                                                                                                                      • Part of subcall function 00A9C253: GetLastError.KERNEL32 ref: 00A9C322
                                                                                                                                                                                                                      • Part of subcall function 00A9C253: SetEvent.KERNEL32(?), ref: 00A9C336
                                                                                                                                                                                                                      • Part of subcall function 00A9C253: InternetCloseHandle.WININET(00000000), ref: 00A9C341
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 337547030-0
                                                                                                                                                                                                                    • Opcode ID: 8ec65db7bd675e1d9a906cc4772251975d1a12c07bf6e20229b328970fb087d0
                                                                                                                                                                                                                    • Instruction ID: 79b896b518e00906df49f2961c5114dbb907bfd6509d00bee6c93953ecb8486c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ec65db7bd675e1d9a906cc4772251975d1a12c07bf6e20229b328970fb087d0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 20318D71300B01AFDF21AFE5DD44AA6BBF8FF58720B10461DF95686622DB31E815DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A83A57
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetCurrentThreadId.KERNEL32 ref: 00A83A5E
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A825B3), ref: 00A83A65
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A825BD
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A825DB
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00A825DF
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A825E9
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A82601
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00A82605
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A8260F
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A82623
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00A82627
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2014098862-0
                                                                                                                                                                                                                    • Opcode ID: 7bd45cc3fc1f171edb8232b088416155eba07e73b24b9d2aa93b4f4fbe2e8e26
                                                                                                                                                                                                                    • Instruction ID: 946c26ba75a06c52c9bf55e022e5ddf2cc988262c7c557034c843dae8f4513fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7bd45cc3fc1f171edb8232b088416155eba07e73b24b9d2aa93b4f4fbe2e8e26
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5501D871390220BBFB10B7A89C8AF597F59DB4EB61F100112F354AE0E2C9F214458B69
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00A81449,?,?,00000000), ref: 00A8180C
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00A81449,?,?,00000000), ref: 00A81813
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A81449,?,?,00000000), ref: 00A81828
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00A81449,?,?,00000000), ref: 00A81830
                                                                                                                                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,00A81449,?,?,00000000), ref: 00A81833
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A81449,?,?,00000000), ref: 00A81843
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00A81449,00000000,?,00A81449,?,?,00000000), ref: 00A8184B
                                                                                                                                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,00A81449,?,?,00000000), ref: 00A8184E
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,00A81874,00000000,00000000,00000000), ref: 00A81868
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1957940570-0
                                                                                                                                                                                                                    • Opcode ID: 2199e68d5a90c6a5093460ec2c58a2db073f422ff1f6811278964fdbe124f763
                                                                                                                                                                                                                    • Instruction ID: e6e790d679e38ff9ad7566ecd3dfaf58a317e4f0c3dca252f77c779da020ca0b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2199e68d5a90c6a5093460ec2c58a2db073f422ff1f6811278964fdbe124f763
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E101BFB5240304BFE710EFA5EC4DF577BACEB89B11F404611FA05EB1A2C6709801CB20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A8D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00A8D501
                                                                                                                                                                                                                      • Part of subcall function 00A8D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00A8D50F
                                                                                                                                                                                                                      • Part of subcall function 00A8D4DC: CloseHandle.KERNELBASE(00000000), ref: 00A8D5DC
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00AAA16D
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00AAA180
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00AAA1B3
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00AAA268
                                                                                                                                                                                                                    • GetLastError.KERNEL32(00000000), ref: 00AAA273
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAA2C4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                    • String ID: SeDebugPrivilege
                                                                                                                                                                                                                    • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                    • Opcode ID: 9596a09f9ee42ce520d4e6ca07e41961d4ae712225098d38ffbbfc9e5d4a7c2a
                                                                                                                                                                                                                    • Instruction ID: 45839bd7a27452993f58b4b3baefc91bfe0860d3a7e0daa12777c3e6ee9af520
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9596a09f9ee42ce520d4e6ca07e41961d4ae712225098d38ffbbfc9e5d4a7c2a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C7618D30204242AFD724DF18D594F5ABBE1AF55318F14859CE4668FBA3C772EC4ACB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00AB3925
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00AB393A
                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00AB3954
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB3999
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00AB39C6
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00AB39F4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                    • String ID: SysListView32
                                                                                                                                                                                                                    • API String ID: 2147712094-78025650
                                                                                                                                                                                                                    • Opcode ID: 64d2e332c7c8a92473cbc3f8825953e24fb5c95afe7b58c901c30fcd86c0f10f
                                                                                                                                                                                                                    • Instruction ID: f6909d172b2a839961b09768f73fa173d59bd7fd06b4ea31cc3965709e5c0fa6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 64d2e332c7c8a92473cbc3f8825953e24fb5c95afe7b58c901c30fcd86c0f10f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B441A472A00218ABEF21DFA4CC45FEA7BADFF48354F100526F554E7292D7B59990CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A8BCFD
                                                                                                                                                                                                                    • IsMenu.USER32(00000000), ref: 00A8BD1D
                                                                                                                                                                                                                    • CreatePopupMenu.USER32 ref: 00A8BD53
                                                                                                                                                                                                                    • GetMenuItemCount.USER32(014D5B58), ref: 00A8BDA4
                                                                                                                                                                                                                    • InsertMenuItemW.USER32(014D5B58,?,00000001,00000030), ref: 00A8BDCC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                    • String ID: 0$2
                                                                                                                                                                                                                    • API String ID: 93392585-3793063076
                                                                                                                                                                                                                    • Opcode ID: 5644c542a644f73f45690bce5e9fbe2841d6ae6fe45dde0f81537f03b5ef6a18
                                                                                                                                                                                                                    • Instruction ID: f8ae8a91f00907c39d115d60aa0fc1d917a564d86b9f1b1ceb574ad73edb868e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5644c542a644f73f45690bce5e9fbe2841d6ae6fe45dde0f81537f03b5ef6a18
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9851C070A10205EBDF20EFA8D984BAEBBF4FF45324F144219E851E72A1D770A945CB71
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 00A8C913
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: IconLoad
                                                                                                                                                                                                                    • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                    • API String ID: 2457776203-404129466
                                                                                                                                                                                                                    • Opcode ID: 8ed475f06937e93cc36f44b23be69e29c7c773db05362ee5448d546750371437
                                                                                                                                                                                                                    • Instruction ID: e0002be7d6ff8c1811fa0818d7182b4734fb8b333c1620ad4dfaf3d6b5a81852
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8ed475f06937e93cc36f44b23be69e29c7c773db05362ee5448d546750371437
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 80113D36689706BAE700BB649C83DAA37ACEF153B4B20047BF500A6382E7745E405B75
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                    • String ID: 0.0.0.0
                                                                                                                                                                                                                    • API String ID: 642191829-3771769585
                                                                                                                                                                                                                    • Opcode ID: 30dbf86720a10d3fadc4be7ddcfa71204f56e73d7253cda12ccdc52b972f3b56
                                                                                                                                                                                                                    • Instruction ID: cecc8127db71500a9226bb1a5ea2327ea8475279b289e9e87fec52b505fe6540
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30dbf86720a10d3fadc4be7ddcfa71204f56e73d7253cda12ccdc52b972f3b56
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4A11E671904114BFCB20BBA4DD4AEEE77BCDF55721F0002A9F545EA0E2EF719A819B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00AB9FC7
                                                                                                                                                                                                                    • GetSystemMetrics.USER32(0000000F), ref: 00AB9FE7
                                                                                                                                                                                                                    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00ABA224
                                                                                                                                                                                                                    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00ABA242
                                                                                                                                                                                                                    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00ABA263
                                                                                                                                                                                                                    • ShowWindow.USER32(00000003,00000000), ref: 00ABA282
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00ABA2A7
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00ABA2CA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1211466189-0
                                                                                                                                                                                                                    • Opcode ID: 7f2d6649a1d139a751f775c3deaff2c55b7186fc150a01bbbec294ca831667fe
                                                                                                                                                                                                                    • Instruction ID: 78e7b62303534d3604d9b2bdc34c66d801496f75a5b49a4e47b4c2afd9df6884
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7f2d6649a1d139a751f775c3deaff2c55b7186fc150a01bbbec294ca831667fe
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5EB1BC31600215DFDF14CF68C985BEE7BB6FF54711F088169EC499B2A6D731A940CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 952045576-0
                                                                                                                                                                                                                    • Opcode ID: d48067c32b79769bb7bdf609880b27e09def23f4f080b250871304cb98d19f2d
                                                                                                                                                                                                                    • Instruction ID: 50ef39882fc814192a70ad27c06a52cf10364d5b5221a0e854d9d1dac150eed4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d48067c32b79769bb7bdf609880b27e09def23f4f080b250871304cb98d19f2d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9F418369C10218B5DB11FBF4898AACFB7ACAF85710F508562E514F3122FB74E255C3A6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00A7682C,00000004,00000000,00000000), ref: 00A3F953
                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00A7682C,00000004,00000000,00000000), ref: 00A7F3D1
                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00A7682C,00000004,00000000,00000000), ref: 00A7F454
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ShowWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1268545403-0
                                                                                                                                                                                                                    • Opcode ID: 141b01db008a2e697ff3b6fe6a0d2b41ce3262656bec228f76e6e3248316800d
                                                                                                                                                                                                                    • Instruction ID: 0a2d5fef0c4dd37f250f84c4649aead2c8da4c72235fe1e700a81f32ee5294ca
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 141b01db008a2e697ff3b6fe6a0d2b41ce3262656bec228f76e6e3248316800d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 93412A31A28640BFC778CB7C8D88B7A7BA1AB56320F14C13CF05B56661D672A981C751
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AB2D1B
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00AB2D23
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00AB2D2E
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00AB2D3A
                                                                                                                                                                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00AB2D76
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00AB2D87
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00AB5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00AB2DC2
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00AB2DE1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3864802216-0
                                                                                                                                                                                                                    • Opcode ID: fffca54f3e6e8a3ef38b3c312abc27214fd9f05d0efac22b0c4cf2f3a5257a98
                                                                                                                                                                                                                    • Instruction ID: cbfbd31388e7f8650d1ed541a3f822154d0cf822d0a991d0e607fb84883659b3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fffca54f3e6e8a3ef38b3c312abc27214fd9f05d0efac22b0c4cf2f3a5257a98
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 27317F72201214BFEB118F54CC89FEB3BADEF49725F044155FE089A2A2C6799C51C7B4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _memcmp
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2931989736-0
                                                                                                                                                                                                                    • Opcode ID: 96d9f1b5c27fa37f6613599f245de7df8c4a3de7291e03ed8bf6362ba2c5e516
                                                                                                                                                                                                                    • Instruction ID: 5ea21e94881edb7b74b11d0c417cb7e80b79cdbd4ce774b869ebb96a732ef7fb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 96d9f1b5c27fa37f6613599f245de7df8c4a3de7291e03ed8bf6362ba2c5e516
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED219F75E50A097BD6187A318E82FFA33ACBE61394F4C4430FD049A682F721ED5183A9
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                    • API String ID: 0-572801152
                                                                                                                                                                                                                    • Opcode ID: 0e7e36c1c525befe6015dc50232d99f52fb50e3c5a08a55407ee66b5fb9208cb
                                                                                                                                                                                                                    • Instruction ID: 7fe6d664f1029d20352e6395cba8af7f55936662685915854c30717ffadbe70e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0e7e36c1c525befe6015dc50232d99f52fb50e3c5a08a55407ee66b5fb9208cb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1AD1C071E0060AAFDF10DFA8C890FAEB7B5BF49344F148569E915AB281E370DD45CB64
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCPInfo.KERNEL32(?,?), ref: 00A615CE
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00A61651
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A616E4
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00A616FB
                                                                                                                                                                                                                      • Part of subcall function 00A53820: RtlAllocateHeap.NTDLL(00000000,?,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6,?,00A21129), ref: 00A53852
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A61777
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A617A2
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A617AE
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2829977744-0
                                                                                                                                                                                                                    • Opcode ID: 2e073de843c5cd579c9f7ffc10a17cabedc934565ede5a3a219960ae9d386bab
                                                                                                                                                                                                                    • Instruction ID: 24d308bab1a6e47586ea41cac1936d89de896478a06be3ccef73e7d6ede6f2a7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2e073de843c5cd579c9f7ffc10a17cabedc934565ede5a3a219960ae9d386bab
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0791A076E002169ADB208FB4C991AEEBFB5EF49310F1C4659E802E7191EB35DD45CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearInit
                                                                                                                                                                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                    • API String ID: 2610073882-625585964
                                                                                                                                                                                                                    • Opcode ID: 991737877c03eedf7b8cae4040226a62bbb839c06358260e293ab84bc2b8a5b6
                                                                                                                                                                                                                    • Instruction ID: 922c80500ed849a755173a403fdba4ee5cd00d621093bfa99b0bcf8c0264b746
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 991737877c03eedf7b8cae4040226a62bbb839c06358260e293ab84bc2b8a5b6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4C918171E00259AFDF24CFA5D844FAEBBB8EF8A714F108559F505AB281D7B09941CFA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00A9125C
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00A91284
                                                                                                                                                                                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00A912A8
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A912D8
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A9135F
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A913C4
                                                                                                                                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00A91430
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2550207440-0
                                                                                                                                                                                                                    • Opcode ID: 49af361110eb4fcdc6ebbd1afb6a60070fbf8d26b40b910dc084eb53c7f8adc6
                                                                                                                                                                                                                    • Instruction ID: 2d89bad9955b75e607461ce94624ae97caf4c733c73ac81bfec1546f1d593be5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 49af361110eb4fcdc6ebbd1afb6a60070fbf8d26b40b910dc084eb53c7f8adc6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5691AD75A0021AAFDF00DFA8C885BBEB7F5FF48325F204429E950EB291D774A941CB90
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3225163088-0
                                                                                                                                                                                                                    • Opcode ID: 025bb2de9ee56b7dc69bfdcfc7b005c387fab4f041ea50f34340ef2d378ecdcc
                                                                                                                                                                                                                    • Instruction ID: 38bc6ea77dbb5dd0a81c688a402d22978707421488eee5613e803554616c4e1c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 025bb2de9ee56b7dc69bfdcfc7b005c387fab4f041ea50f34340ef2d378ecdcc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 98911471D40219AFCB10CFA9CC85AEEBBB8FF49320F148559F515B7251D374AA82CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00AA396B
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00AA3A7A
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AA3A8A
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AA3C1F
                                                                                                                                                                                                                      • Part of subcall function 00A90CDF: VariantInit.OLEAUT32(00000000), ref: 00A90D1F
                                                                                                                                                                                                                      • Part of subcall function 00A90CDF: VariantCopy.OLEAUT32(?,?), ref: 00A90D28
                                                                                                                                                                                                                      • Part of subcall function 00A90CDF: VariantClear.OLEAUT32(?), ref: 00A90D34
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                    • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                    • Opcode ID: ad1db127882bc59a80aae7125e66ee74c60d1939af086c1e0b29068dbbc226d8
                                                                                                                                                                                                                    • Instruction ID: 737898c86ae45787c1ac4db938e3e645248eccfeb8f2c09ce482695faf04402c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ad1db127882bc59a80aae7125e66ee74c60d1939af086c1e0b29068dbbc226d8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 54918C756083059FCB00DF68C58096AB7E5FF89714F14896DF88A9B391DB31EE05CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A8000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?,?,00A8035E), ref: 00A8002B
                                                                                                                                                                                                                      • Part of subcall function 00A8000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?), ref: 00A80046
                                                                                                                                                                                                                      • Part of subcall function 00A8000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?), ref: 00A80054
                                                                                                                                                                                                                      • Part of subcall function 00A8000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?), ref: 00A80064
                                                                                                                                                                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00AA4C51
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AA4D59
                                                                                                                                                                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00AA4DCF
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00AA4DDA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                    • String ID: NULL Pointer assignment
                                                                                                                                                                                                                    • API String ID: 614568839-2785691316
                                                                                                                                                                                                                    • Opcode ID: 448d58fb6dec421b35705769f6ec45dae1e7b6c6545df508ef361734f62a64b2
                                                                                                                                                                                                                    • Instruction ID: f4bed8876826c81b715ff2f017ea4d06bfb47e5cdb45c94045cf36a5277bda68
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 448d58fb6dec421b35705769f6ec45dae1e7b6c6545df508ef361734f62a64b2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 59912771D0022DAFDF24DFA4D880AEEB7B8BF49310F104169F919A7291EB705A45CF60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenu.USER32(?), ref: 00AB2183
                                                                                                                                                                                                                    • GetMenuItemCount.USER32(00000000), ref: 00AB21B5
                                                                                                                                                                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00AB21DD
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB2213
                                                                                                                                                                                                                    • GetMenuItemID.USER32(?,?), ref: 00AB224D
                                                                                                                                                                                                                    • GetSubMenu.USER32(?,?), ref: 00AB225B
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A83A57
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetCurrentThreadId.KERNEL32 ref: 00A83A5E
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A825B3), ref: 00A83A65
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00AB22E3
                                                                                                                                                                                                                      • Part of subcall function 00A8E97B: Sleep.KERNEL32 ref: 00A8E9F3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4196846111-0
                                                                                                                                                                                                                    • Opcode ID: f979091d4dfb79588c57ff1e6c1fcb1081709335613eaaacf40e59ce5e4c7ba0
                                                                                                                                                                                                                    • Instruction ID: 6e7b4b391573d3ef157ee8ed5551ff3e37236108c81ff94301bde5aa9b6ab4f7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f979091d4dfb79588c57ff1e6c1fcb1081709335613eaaacf40e59ce5e4c7ba0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F3715075A00215AFCB14DFA8D945BEEB7F5EF48320F148469E816EB352D734ED428B90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32(014D5B80), ref: 00AB7F37
                                                                                                                                                                                                                    • IsWindowEnabled.USER32(014D5B80), ref: 00AB7F43
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00AB801E
                                                                                                                                                                                                                    • SendMessageW.USER32(014D5B80,000000B0,?,?), ref: 00AB8051
                                                                                                                                                                                                                    • IsDlgButtonChecked.USER32(?,?), ref: 00AB8089
                                                                                                                                                                                                                    • GetWindowLongW.USER32(014D5B80,000000EC), ref: 00AB80AB
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00AB80C3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4072528602-0
                                                                                                                                                                                                                    • Opcode ID: 074ac15bd8db06e91ddce09dcd6d7ed7dcd9681d14de7f17abe45b35a8c42ffd
                                                                                                                                                                                                                    • Instruction ID: d70f265d937c408f1db59c98fd2f48a8985321bf428ebf3fbced008e9ee75479
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 074ac15bd8db06e91ddce09dcd6d7ed7dcd9681d14de7f17abe45b35a8c42ffd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6771AE34609204AFEB21DFA4C894FFEBBBDEF49340F140459E945972A2CBB5AC45DB14
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetParent.USER32(?), ref: 00A8AEF9
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 00A8AF0E
                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 00A8AF6F
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A8AF9D
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A8AFBC
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A8AFFD
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A8B020
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 87235514-0
                                                                                                                                                                                                                    • Opcode ID: 091ed75c24a989ebedb49fa9708563584ab5da0cd828da8c05ee3b2ea6b507f3
                                                                                                                                                                                                                    • Instruction ID: 0a7043cfee6c6322ffe3b062b5e6e3c05f9fa71cfb1fefefc1c98cf330383f64
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 091ed75c24a989ebedb49fa9708563584ab5da0cd828da8c05ee3b2ea6b507f3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA5103A06147D13DFB36A3348C45BBBBEE95B06304F08858AE2E9458C3D3D8ACD4D761
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetParent.USER32(00000000), ref: 00A8AD19
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?), ref: 00A8AD2E
                                                                                                                                                                                                                    • SetKeyboardState.USER32(?), ref: 00A8AD8F
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A8ADBB
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A8ADD8
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A8AE17
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A8AE38
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 87235514-0
                                                                                                                                                                                                                    • Opcode ID: 654bf3ed70fb8811ff3ee037b92d99d7cf0d2764a9ed822ba936a339b7946c38
                                                                                                                                                                                                                    • Instruction ID: 6927a7307cde0c87195e6f1297f20c47e12050bc23dcbd61a0e9263c0b7ee380
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 654bf3ed70fb8811ff3ee037b92d99d7cf0d2764a9ed822ba936a339b7946c38
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 385109A1A047E53DFB33A3348C55BBABEA85B55301F0C898AE1D5868C3D394EC84D762
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetConsoleCP.KERNEL32(00A63CD6,?,?,?,?,?,?,?,?,00A55BA3,?,?,00A63CD6,?,?), ref: 00A55470
                                                                                                                                                                                                                    • __fassign.LIBCMT ref: 00A554EB
                                                                                                                                                                                                                    • __fassign.LIBCMT ref: 00A55506
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00A63CD6,00000005,00000000,00000000), ref: 00A5552C
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,00A63CD6,00000000,00A55BA3,00000000,?,?,?,?,?,?,?,?,?,00A55BA3,?), ref: 00A5554B
                                                                                                                                                                                                                    • WriteFile.KERNEL32(?,?,00000001,00A55BA3,00000000,?,?,?,?,?,?,?,?,?,00A55BA3,?), ref: 00A55584
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1324828854-0
                                                                                                                                                                                                                    • Opcode ID: 041f09aaa6d0882b2e68a07c4a2f4324cbefd7e2eef2bde8bf9ae9a4a3e0e811
                                                                                                                                                                                                                    • Instruction ID: b82e7d15056c7353e0aaf5910267833ada1b1d63acbe0d66d87fec1a5c3ab96d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 041f09aaa6d0882b2e68a07c4a2f4324cbefd7e2eef2bde8bf9ae9a4a3e0e811
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5451C1B1E006499FDB10CFA8D851AEEBBF9FF09311F14412AE955E7292E6309A45CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00A42D4B
                                                                                                                                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00A42D53
                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00A42DE1
                                                                                                                                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00A42E0C
                                                                                                                                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00A42E61
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                    • String ID: csm
                                                                                                                                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                                                                                                                                    • Opcode ID: eafef42a4aba7a26e9dbce25dbe50304a66ce6c7a402233372f4457e2396b6f2
                                                                                                                                                                                                                    • Instruction ID: fd6e640659bea10ed2bd425e92260a6e9e840b83fe40f7e440c8edae57dc671d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eafef42a4aba7a26e9dbce25dbe50304a66ce6c7a402233372f4457e2396b6f2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 44419F39E00209EBCF10DF68C885B9EBBB5BF84324F548155F915AB392D771AA16CBD0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00AA304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00AA307A
                                                                                                                                                                                                                      • Part of subcall function 00AA304E: _wcslen.LIBCMT ref: 00AA309B
                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00AA1112
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1121
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA11C9
                                                                                                                                                                                                                    • closesocket.WSOCK32(00000000), ref: 00AA11F9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2675159561-0
                                                                                                                                                                                                                    • Opcode ID: 2ecb6fc45ad3834248332b0580eab8babc5a2408a80d3258a7eededd3331481c
                                                                                                                                                                                                                    • Instruction ID: cb2041bf2ab65da5be4550cc0312ef73548c5dc6b30f7688358ac914589d9d47
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2ecb6fc45ad3834248332b0580eab8babc5a2408a80d3258a7eededd3331481c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6241F431600214AFDB10DF54D884BA9B7E9EF46364F148259F9159B2D2D770ED82CBE0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A8DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A8CF22,?), ref: 00A8DDFD
                                                                                                                                                                                                                      • Part of subcall function 00A8DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A8CF22,?), ref: 00A8DE16
                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00A8CF45
                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00A8CF7F
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8D005
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8D01B
                                                                                                                                                                                                                    • SHFileOperationW.SHELL32(?), ref: 00A8D061
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                    • String ID: \*.*
                                                                                                                                                                                                                    • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                    • Opcode ID: d6c4b5fdc1509c8e62d4c03cfb9ea253230874b6235d3252c4231f651db69204
                                                                                                                                                                                                                    • Instruction ID: 60a4af8e988708f563936f747d1aa2ea2cbb708325f46368d49e9d195a06de9c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6c4b5fdc1509c8e62d4c03cfb9ea253230874b6235d3252c4231f651db69204
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA4153719052189FDF12FBA4DA81EDEB7B9AF58790F0000E6E605EB142EB34AB45CF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00AB2E1C
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB2E4F
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB2E84
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00AB2EB6
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00AB2EE0
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB2EF1
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00AB2F0B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2178440468-0
                                                                                                                                                                                                                    • Opcode ID: d49636f69fda801e6c012be56ae683d96c5bb420c1cc17e1ac0b5aaf190b1a7e
                                                                                                                                                                                                                    • Instruction ID: f180e0c59964d3ebc135015a9593ea3ac9641ff5a6fea9c2a5a9e76e1f846f56
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d49636f69fda801e6c012be56ae683d96c5bb420c1cc17e1ac0b5aaf190b1a7e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A531F230644250AFEB21CF99DC94FA53BE9EB9A720F150166F9008B2B2CBB5E841DB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A87769
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A8778F
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00A87792
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00A877B0
                                                                                                                                                                                                                    • SysFreeString.OLEAUT32(?), ref: 00A877B9
                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00A877DE
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00A877EC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3761583154-0
                                                                                                                                                                                                                    • Opcode ID: 19883348576127072304e03bdca8f9ab9d31336e48a4cf2adc574fa8266bf481
                                                                                                                                                                                                                    • Instruction ID: 80163703fa3e19f606fb162f9b630a9c6d17ca60f3a14807bb3e8083ff70bf4f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 19883348576127072304e03bdca8f9ab9d31336e48a4cf2adc574fa8266bf481
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9B21B376608219AFDF10EFA8DC88CBF77ACEB09764B148125FA15DB261D670DD42C760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A87842
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A87868
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00A8786B
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32 ref: 00A8788C
                                                                                                                                                                                                                    • SysFreeString.OLEAUT32 ref: 00A87895
                                                                                                                                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00A878AF
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00A878BD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3761583154-0
                                                                                                                                                                                                                    • Opcode ID: 4ed33f296dfcf6b1bd9d461239b1e52047fb65e1adde274bd31e454372e5679e
                                                                                                                                                                                                                    • Instruction ID: 52a72bf8e462e810c82efa045f018f16ec3a099dcf2c985a3f2582627045b18d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ed33f296dfcf6b1bd9d461239b1e52047fb65e1adde274bd31e454372e5679e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 27213236608104AFDB10EFE8DC8CDAE77ACEB49760B208125F915DB2A1DA74DD81CB74
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00A904F2
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A9052E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateHandlePipe
                                                                                                                                                                                                                    • String ID: nul
                                                                                                                                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                    • Opcode ID: 2386c2d7edbd5b3481440d0c1198040d04e873953ef6331c0e369979fb82b811
                                                                                                                                                                                                                    • Instruction ID: 05032019517cb98ec427fde3cfb056eaf01705c3fefd3e3f49d2cb16a110f5ee
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2386c2d7edbd5b3481440d0c1198040d04e873953ef6331c0e369979fb82b811
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B216B75600305AFDF209F69DC44E9A7BF8AF547A4F618A29F8A1E72E0D7709941CF20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00A905C6
                                                                                                                                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A90601
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateHandlePipe
                                                                                                                                                                                                                    • String ID: nul
                                                                                                                                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                    • Opcode ID: a3200428767a75a0448caf99785704aa2418327c5573778f9026f77875033b03
                                                                                                                                                                                                                    • Instruction ID: 5bd508d01bf3ce6a599ffe87f4abee629653797eebc5e5b1c1b85e5eab01efb5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a3200428767a75a0448caf99785704aa2418327c5573778f9026f77875033b03
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: ED2183756003059FDF209F699C04E9A7BE8BF957B0F200B19F9A1E72E0D7B09961CB20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A2604C
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: GetStockObject.GDI32(00000011), ref: 00A26060
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A2606A
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00AB4112
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00AB411F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00AB412A
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00AB4139
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00AB4145
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                    • String ID: Msctls_Progress32
                                                                                                                                                                                                                    • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                    • Opcode ID: 5b3cfd433ebd256566876374f92f05f85d4249c74f00db4d28b22e0551b79e30
                                                                                                                                                                                                                    • Instruction ID: 7c41a65263db014b302c33382aa11a1e2cf5e46e77b10eba7498637ffe9ea9f8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5b3cfd433ebd256566876374f92f05f85d4249c74f00db4d28b22e0551b79e30
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CE11B2B2150219BEEF119FA8CC85EE77F6DEF08798F004211BA18A2051C7769C21DBA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A5D7A3: _free.LIBCMT ref: 00A5D7CC
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D82D
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D838
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D843
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D897
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D8A2
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D8AD
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D8B8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                    • Instruction ID: 531cb264f2ccdb7efbd7ffb9704f06e266cc61f1b11936350636bd5306e51633
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A9115E71540B04EAD631BFB0CE47FCB7BDCBF49702F400825BA99AA993DA75B5098760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A8DA74
                                                                                                                                                                                                                    • LoadStringW.USER32(00000000), ref: 00A8DA7B
                                                                                                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A8DA91
                                                                                                                                                                                                                    • LoadStringW.USER32(00000000), ref: 00A8DA98
                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A8DADC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 00A8DAB9
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                    • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                    • Opcode ID: 012e1c30b1acb266ce37235d1ebdebb485c2d685ce291e956a4a80faca823ab8
                                                                                                                                                                                                                    • Instruction ID: 6ed93a7bc2289b788cc1cbd74cbf0359850c3e743518b052d0fea8c8864d8c34
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 012e1c30b1acb266ce37235d1ebdebb485c2d685ce291e956a4a80faca823ab8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0A0186F29002087FE711EBE49D89EF7776CE708351F400991B706E2092EA749E854F74
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(014CEA48,014CEA48), ref: 00A9097B
                                                                                                                                                                                                                    • EnterCriticalSection.KERNEL32(014CEA28,00000000), ref: 00A9098D
                                                                                                                                                                                                                    • TerminateThread.KERNEL32(?,000001F6), ref: 00A9099B
                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00A909A9
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00A909B8
                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(014CEA48,000001F6), ref: 00A909C8
                                                                                                                                                                                                                    • LeaveCriticalSection.KERNEL32(014CEA28), ref: 00A909CF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3495660284-0
                                                                                                                                                                                                                    • Opcode ID: 7ef2955413b3864633a4df88b0e6d38c530783d7d3a19eb231c15301189835e6
                                                                                                                                                                                                                    • Instruction ID: 12b750270b98d87b592220f1232a0b60551ac74cdba2e3faef912d5ad33b4c37
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7ef2955413b3864633a4df88b0e6d38c530783d7d3a19eb231c15301189835e6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0F01D31542512ABDB45AF94EE88ED6BA65BF01752F401226F201508B2C7749866CF90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00A25D30
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A25D71
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00A25D99
                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00A25ED7
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A25EF8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1296646539-0
                                                                                                                                                                                                                    • Opcode ID: 308f5106c6e04dde280039fbf6c4e1c43fb6d908bc2254b73c89b82e4f46c5e9
                                                                                                                                                                                                                    • Instruction ID: 76024120cf894fe0affc10c50531cbfd4938d901c46fe5c8d7ba65cf12ecf250
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 308f5106c6e04dde280039fbf6c4e1c43fb6d908bc2254b73c89b82e4f46c5e9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8B17735A00A4ADBDB14CFB9C4807EEB7F1FF58310F14952AE8AAD7250DB30AA51DB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 00A500BA
                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A500D6
                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 00A500ED
                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A5010B
                                                                                                                                                                                                                    • __allrem.LIBCMT ref: 00A50122
                                                                                                                                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A50140
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1992179935-0
                                                                                                                                                                                                                    • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                    • Instruction ID: 17a9f7d4f5005fff76af002f280702061d1d778c7f48d2525442117badb6bd84
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5B81E476A00B069FE7209F68CD41F6B77F9BF81325F24423AF951D6681E7B0D9088B91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00AA3149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00AA101C,00000000,?,?,00000000), ref: 00AA3195
                                                                                                                                                                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00AA1DC0
                                                                                                                                                                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00AA1DE1
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1DF2
                                                                                                                                                                                                                    • inet_ntoa.WSOCK32(?), ref: 00AA1E8C
                                                                                                                                                                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 00AA1EDB
                                                                                                                                                                                                                    • _strlen.LIBCMT ref: 00AA1F35
                                                                                                                                                                                                                      • Part of subcall function 00A839E8: _strlen.LIBCMT ref: 00A839F2
                                                                                                                                                                                                                      • Part of subcall function 00A26D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00A3CF58,?,?,?), ref: 00A26DBA
                                                                                                                                                                                                                      • Part of subcall function 00A26D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00A3CF58,?,?,?), ref: 00A26DED
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1923757996-0
                                                                                                                                                                                                                    • Opcode ID: 7da7d2f95f0d6b42f68c52194e3e21b222e5cb132f31818a035100290343b7f5
                                                                                                                                                                                                                    • Instruction ID: 2fce218c605ee7ecdaf34756f90c4e790fc911412a17f4e6f3d2d6253e8d791b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7da7d2f95f0d6b42f68c52194e3e21b222e5cb132f31818a035100290343b7f5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9FA10F31604350AFC324EF24C895F2ABBE5AF86318F54895DF4565B2E2DB31ED42CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00A482D9,00A482D9,?,?,?,00A5644F,00000001,00000001,8BE85006), ref: 00A56258
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00A5644F,00000001,00000001,8BE85006,?,?,?), ref: 00A562DE
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00A563D8
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A563E5
                                                                                                                                                                                                                      • Part of subcall function 00A53820: RtlAllocateHeap.NTDLL(00000000,?,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6,?,00A21129), ref: 00A53852
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A563EE
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A56413
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1414292761-0
                                                                                                                                                                                                                    • Opcode ID: 4c38adb5544f179a7997206ec78afe7e5a4f563c1cceeea5729d14c0c6c0e133
                                                                                                                                                                                                                    • Instruction ID: 6f53df03f44e9173fb2e5dbb7763df39c3d92d13ca2de951dc6b50bb9876a557
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4c38adb5544f179a7997206ec78afe7e5a4f563c1cceeea5729d14c0c6c0e133
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C151F172A00216ABEF258F64DD81EBF7BA9FB44762F544229FC05DB141EB34DC48C660
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AAB6AE,?,?), ref: 00AAC9B5
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AAC9F1
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA68
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA9E
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AABCCA
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AABD25
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AABD6A
                                                                                                                                                                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00AABD99
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00AABDF3
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00AABDFF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1120388591-0
                                                                                                                                                                                                                    • Opcode ID: dd1242315b959b032cb2c75311692aec1161d967b60fb796bf0912b61a5f1479
                                                                                                                                                                                                                    • Instruction ID: a5d1031262fae353f2a7e3fd0eaaf9f1d68a00d5faf9f0aae5896f74eccb8fdd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dd1242315b959b032cb2c75311692aec1161d967b60fb796bf0912b61a5f1479
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BF818030218241EFD714DF24C995E2ABBE5FF85318F14896CF4594B2A2DB31ED45CBA2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(00000035), ref: 00A7F7B9
                                                                                                                                                                                                                    • SysAllocString.OLEAUT32(00000001), ref: 00A7F860
                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(00A7FA64,00000000), ref: 00A7F889
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(00A7FA64), ref: 00A7F8AD
                                                                                                                                                                                                                    • VariantCopy.OLEAUT32(00A7FA64,00000000), ref: 00A7F8B1
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A7F8BB
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3859894641-0
                                                                                                                                                                                                                    • Opcode ID: 854f6eb7f589b10b32d1d62f769c7c8c0dc5ff609e29bc1e0d325a19d891a2ac
                                                                                                                                                                                                                    • Instruction ID: 73a95be5be78a61936a967aa7172dd5ae5e5391c2225b75a257c0d1ac978baab
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 854f6eb7f589b10b32d1d62f769c7c8c0dc5ff609e29bc1e0d325a19d891a2ac
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 14519431610310BECF24AB65DC95B6AB3A4EF45710F24D467F90AEF296DB708E40C7A6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A27620: _wcslen.LIBCMT ref: 00A27625
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00A994E5
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A99506
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A9952D
                                                                                                                                                                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00A99585
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                    • String ID: X
                                                                                                                                                                                                                    • API String ID: 83654149-3081909835
                                                                                                                                                                                                                    • Opcode ID: a3d9dd811d4bf1d44d387c4ec684c9916a55c801ffae06ba298eed7fa727d424
                                                                                                                                                                                                                    • Instruction ID: 6c5246cf9d0929d9a250025f2312cf90492b551918f6e64f2da31e9f16009e76
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a3d9dd811d4bf1d44d387c4ec684c9916a55c801ffae06ba298eed7fa727d424
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 26E1C1316083509FDB24DF28D981A6FB7E4BF85310F04896DF8899B2A2DB31DD05CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • BeginPaint.USER32(?,?,?), ref: 00A39241
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A392A5
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00A392C2
                                                                                                                                                                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00A392D3
                                                                                                                                                                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00A39321
                                                                                                                                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00A771EA
                                                                                                                                                                                                                      • Part of subcall function 00A39339: BeginPath.GDI32(00000000), ref: 00A39357
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3050599898-0
                                                                                                                                                                                                                    • Opcode ID: df74c25654f14db9f09349d22c1c182f84f1b015f9258d20191009e21ebe058a
                                                                                                                                                                                                                    • Instruction ID: 9ea122b831a5b1436cbda955d3368586cfbb8b31f68289ac691c2780d462ac60
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: df74c25654f14db9f09349d22c1c182f84f1b015f9258d20191009e21ebe058a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D41AC71104200AFD711DFA8CCC4FBB7BB8EB55360F044269F9A59B2B2C7B19846DB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A9080C
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00A90847
                                                                                                                                                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00A90863
                                                                                                                                                                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 00A908DC
                                                                                                                                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00A908F3
                                                                                                                                                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A90921
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3368777196-0
                                                                                                                                                                                                                    • Opcode ID: 38600b2e5008270e61b56ee9f37cb2980ccb51b86e81dddc7cdb55c9d6a04915
                                                                                                                                                                                                                    • Instruction ID: aa8aa02235b367aa5dbb51907e11a2aadfcea9651ac4b26fd70c3481a62290c4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 38600b2e5008270e61b56ee9f37cb2980ccb51b86e81dddc7cdb55c9d6a04915
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 85414B71A00205AFDF14EF94DD85EAAB7B8FF44310F1440A9ED049A297D730DE65DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00A7F3AB,00000000,?,?,00000000,?,00A7682C,00000004,00000000,00000000), ref: 00AB824C
                                                                                                                                                                                                                    • EnableWindow.USER32(?,00000000), ref: 00AB8272
                                                                                                                                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00AB82D1
                                                                                                                                                                                                                    • ShowWindow.USER32(?,00000004), ref: 00AB82E5
                                                                                                                                                                                                                    • EnableWindow.USER32(?,00000001), ref: 00AB830B
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00AB832F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 642888154-0
                                                                                                                                                                                                                    • Opcode ID: 16ab84ac3d3810c4aa0451ffceb612ef81b8230c9894e61da8d580303f1e4f50
                                                                                                                                                                                                                    • Instruction ID: 075da3a323060db35e00d2d87618a427d33a585a3dcd50d88f8f690f75de3c67
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 16ab84ac3d3810c4aa0451ffceb612ef81b8230c9894e61da8d580303f1e4f50
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F7418334601644EFDB11CF99C899FE47BE8BB0A714F1842A9E5184F273CB75A842CB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindowVisible.USER32(?), ref: 00A84C95
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A84CB2
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A84CEA
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A84D08
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A84D10
                                                                                                                                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 00A84D1A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 72514467-0
                                                                                                                                                                                                                    • Opcode ID: d6da479c23d73231abfdb9054f2df2048c7704d4db101ab33f34adb7726b4eb1
                                                                                                                                                                                                                    • Instruction ID: d3e7d4f55c0f6841c6dbe77728bc01073f5b5d4382310c01f0f637e523d84120
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d6da479c23d73231abfdb9054f2df2048c7704d4db101ab33f34adb7726b4eb1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A5210B72604201BFEB15AB75DD49E7B7FACDF4D760F108039F805CA1A2EA65DC0197A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A23AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A23A97,?,?,00A22E7F,?,?,?,00000000), ref: 00A23AC2
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A9587B
                                                                                                                                                                                                                    • CoInitialize.OLE32(00000000), ref: 00A95995
                                                                                                                                                                                                                    • CoCreateInstance.OLE32(00ABFCF8,00000000,00000001,00ABFB68,?), ref: 00A959AE
                                                                                                                                                                                                                    • CoUninitialize.OLE32 ref: 00A959CC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                    • String ID: .lnk
                                                                                                                                                                                                                    • API String ID: 3172280962-24824748
                                                                                                                                                                                                                    • Opcode ID: 3c53ca3c1c0123dc0acecaac675385689af676caebd9ade587b94f527ff9c4da
                                                                                                                                                                                                                    • Instruction ID: 55cfffac8250ea48802570b4fa36705fcc09dc0ab6b1660d01c3d89a79d42306
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 3c53ca3c1c0123dc0acecaac675385689af676caebd9ade587b94f527ff9c4da
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3BD16375A047119FCB04DF28C581A2EBBE1FF89710F148869F88A9B361DB31ED05CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A80FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A80FCA
                                                                                                                                                                                                                      • Part of subcall function 00A80FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A80FD6
                                                                                                                                                                                                                      • Part of subcall function 00A80FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A80FE5
                                                                                                                                                                                                                      • Part of subcall function 00A80FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A80FEC
                                                                                                                                                                                                                      • Part of subcall function 00A80FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A81002
                                                                                                                                                                                                                    • GetLengthSid.ADVAPI32(?,00000000,00A81335), ref: 00A817AE
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A817BA
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00A817C1
                                                                                                                                                                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A817DA
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,00A81335), ref: 00A817EE
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A817F5
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3008561057-0
                                                                                                                                                                                                                    • Opcode ID: ffe6547a0a12f9c69031b83e9f8add6e3348d0f2ccdecec109d8f0267851acb7
                                                                                                                                                                                                                    • Instruction ID: 2b421d043eed9a6bef9018c81ab736bec200fdea11239fc82445260868ec5933
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ffe6547a0a12f9c69031b83e9f8add6e3348d0f2ccdecec109d8f0267851acb7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 22116A72500205EFDB10EFA8DC49FAE7BBDEB45765F104219F481A7222D735A946CF60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A814FF
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00A81506
                                                                                                                                                                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A81515
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000004), ref: 00A81520
                                                                                                                                                                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A8154F
                                                                                                                                                                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A81563
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1413079979-0
                                                                                                                                                                                                                    • Opcode ID: 431d1284cf0db7c6cc6b51b6065fec2d936116515060263cafb6ca51d63abd9a
                                                                                                                                                                                                                    • Instruction ID: da15e7ecabae2b00f2f268ffc53aa63f3040b95c966b640a621b695ad01da53d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 431d1284cf0db7c6cc6b51b6065fec2d936116515060263cafb6ca51d63abd9a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2E1159B2504209ABDF11EFD8DD49FDE7BADEF48714F044124FA05A2060C3758E62DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,00A43379,00A42FE5), ref: 00A43390
                                                                                                                                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00A4339E
                                                                                                                                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00A433B7
                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,00A43379,00A42FE5), ref: 00A43409
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3852720340-0
                                                                                                                                                                                                                    • Opcode ID: f2f5cf41f46e76862cd5908e368d071206db8bed0c87a4298e28fae5c473a9dc
                                                                                                                                                                                                                    • Instruction ID: e9cf53ccef41637f665cb6370257af4f1b2787656059e2e523ff53d2440fbd36
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f2f5cf41f46e76862cd5908e368d071206db8bed0c87a4298e28fae5c473a9dc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE01F03B609312BFEE1967F87DC59575A94EB857767200329F4208D1F2FF115E035644
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,00A55686,00A63CD6,?,00000000,?,00A55B6A,?,?,?,?,?,00A4E6D1,?,00AE8A48), ref: 00A52D78
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52DAB
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52DD3
                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,00A4E6D1,?,00AE8A48,00000010,00A24F4A,?,?,00000000,00A63CD6), ref: 00A52DE0
                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,00A4E6D1,?,00AE8A48,00000010,00A24F4A,?,?,00000000,00A63CD6), ref: 00A52DEC
                                                                                                                                                                                                                    • _abort.LIBCMT ref: 00A52DF2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3160817290-0
                                                                                                                                                                                                                    • Opcode ID: 5d93dfb4a33661c43a130ef6e8e3ec8311846e88f56fd50e34d93f099b169405
                                                                                                                                                                                                                    • Instruction ID: ed775708aca136166d64593f7cee931b3aea8399e03d827681e5c4d2bf93a027
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5d93dfb4a33661c43a130ef6e8e3ec8311846e88f56fd50e34d93f099b169405
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 69F0A433544A0067D61267B4AD06F5E2679BBC37B3F254519FC24A61A3EF34880E4360
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A39693
                                                                                                                                                                                                                      • Part of subcall function 00A39639: SelectObject.GDI32(?,00000000), ref: 00A396A2
                                                                                                                                                                                                                      • Part of subcall function 00A39639: BeginPath.GDI32(?), ref: 00A396B9
                                                                                                                                                                                                                      • Part of subcall function 00A39639: SelectObject.GDI32(?,00000000), ref: 00A396E2
                                                                                                                                                                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00AB8A4E
                                                                                                                                                                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 00AB8A62
                                                                                                                                                                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00AB8A70
                                                                                                                                                                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 00AB8A80
                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 00AB8A90
                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 00AB8AA0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 43455801-0
                                                                                                                                                                                                                    • Opcode ID: ed4d5e480582d7ed30692c24706992edcd99fc343e78512236c4a84077c0ba12
                                                                                                                                                                                                                    • Instruction ID: 9ba14c1cfc8d7f297ad1efda72958534f4c29d845bd6109ef11b2f830c010a13
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ed4d5e480582d7ed30692c24706992edcd99fc343e78512236c4a84077c0ba12
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DD11FA76400149FFDB119FD4EC88EAA7F6CEB04360F008111FA1595171C7719D56DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00A85218
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A85229
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A85230
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00A85238
                                                                                                                                                                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A8524F
                                                                                                                                                                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00A85261
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CapsDevice$Release
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1035833867-0
                                                                                                                                                                                                                    • Opcode ID: f1af3f7963200998c57e214f5265f78dd0d9f7a92f22ab6c2e7910628b278bc0
                                                                                                                                                                                                                    • Instruction ID: 0819c590bb9fbd16b3ef57e279bc3e9efbd4dc07efd521500be28755919429ff
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f1af3f7963200998c57e214f5265f78dd0d9f7a92f22ab6c2e7910628b278bc0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7F014F75E00718BBEB10ABF99C49E5EBFB8FF48761F044165FA04A7291DA709901CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A21BF4
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A21BFC
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A21C07
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A21C12
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A21C1A
                                                                                                                                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A21C22
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Virtual
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4278518827-0
                                                                                                                                                                                                                    • Opcode ID: ae9ac1d2fa98792ef93af957c830641d326a0ce769a93b5da1873435c73a08cb
                                                                                                                                                                                                                    • Instruction ID: 94013edbdfc65a2323be1170879abbebbcc938111195e63bbd5f5d4dcbab055c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ae9ac1d2fa98792ef93af957c830641d326a0ce769a93b5da1873435c73a08cb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0C0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A8EB30
                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A8EB46
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00A8EB55
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A8EB64
                                                                                                                                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A8EB6E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A8EB75
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 839392675-0
                                                                                                                                                                                                                    • Opcode ID: 64c02621aa7c944c38dd062c157566ad7a4d956b632d4ec6a645e2209fef5575
                                                                                                                                                                                                                    • Instruction ID: 0511d1b151047116414bd45dbbf00ba2513438f2a455982db0ed2b8531d9f4ee
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 64c02621aa7c944c38dd062c157566ad7a4d956b632d4ec6a645e2209fef5575
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 62F05B72140154BBD72197929C0DEEF7F7CEFCAB21F004259F501E50A2E7A45A02C6B5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetClientRect.USER32(?), ref: 00A77452
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00A77469
                                                                                                                                                                                                                    • GetWindowDC.USER32(?), ref: 00A77475
                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00A77484
                                                                                                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00A77496
                                                                                                                                                                                                                    • GetSysColor.USER32(00000005), ref: 00A774B0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 272304278-0
                                                                                                                                                                                                                    • Opcode ID: eb824fe57f68f502fde75409fff0ae6d11b86281785977015e6fa94ced585e01
                                                                                                                                                                                                                    • Instruction ID: 71809d736bc4646cbd41f79b223787b4278e6e3806922c864804f63b7d20bc6e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: eb824fe57f68f502fde75409fff0ae6d11b86281785977015e6fa94ced585e01
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E8014B31400215EFDB519FA4DC08FAE7BB5FB04321F518264F91AA21B2CB311E52EB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A8187F
                                                                                                                                                                                                                    • UnloadUserProfile.USERENV(?,?), ref: 00A8188B
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00A81894
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00A8189C
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00A818A5
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A818AC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 146765662-0
                                                                                                                                                                                                                    • Opcode ID: efd09564eca3db7f3468e48f35c1225b1a5d41a0c4f562e2a26844679d1f95e1
                                                                                                                                                                                                                    • Instruction ID: 098c63bdbadd3f98cc3de0a45c3bc03987e9e3b56a39f61e2ed177f37e02fa38
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: efd09564eca3db7f3468e48f35c1225b1a5d41a0c4f562e2a26844679d1f95e1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8CE0C276004101BBDA019FE5ED0CD0ABB69FB49B32B508321F22595072CB329462DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A27620: _wcslen.LIBCMT ref: 00A27625
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A8C6EE
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8C735
                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A8C79C
                                                                                                                                                                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A8C7CA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                    • Opcode ID: 0bc1f4f4d4822b11b55ad0c3f66e078721e52dcd1a08c855bdd6bb46a0cc44db
                                                                                                                                                                                                                    • Instruction ID: 0f58012e0ff343a496428e781fdb4389c114b2f15ebb0992d03d260c7ff9222e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0bc1f4f4d4822b11b55ad0c3f66e078721e52dcd1a08c855bdd6bb46a0cc44db
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4651BF716143019BD714EF68C985B6BB7E8AF89324F040A39F995D31A1EB70DD04CF62
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00AAAEA3
                                                                                                                                                                                                                      • Part of subcall function 00A27620: _wcslen.LIBCMT ref: 00A27625
                                                                                                                                                                                                                    • GetProcessId.KERNEL32(00000000), ref: 00AAAF38
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAAF67
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                    • String ID: <$@
                                                                                                                                                                                                                    • API String ID: 146682121-1426351568
                                                                                                                                                                                                                    • Opcode ID: 08a236f75702e5ae8d115ccec701736092c7409f6ba7d0730804cd327da53dbc
                                                                                                                                                                                                                    • Instruction ID: 22ecf0d8980e95f27fee73be38b2044b65f86f17a83cab5921b600eef4c8e042
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08a236f75702e5ae8d115ccec701736092c7409f6ba7d0730804cd327da53dbc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B6718D71A00625DFCB14DF58D584A9EBBF0FF09310F0484A9E85AAB3A2C774EE45CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A87206
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A8723C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A8724D
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A872CF
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                    • String ID: DllGetClassObject
                                                                                                                                                                                                                    • API String ID: 753597075-1075368562
                                                                                                                                                                                                                    • Opcode ID: 509d8c3089a8338f69f02277a40f60c0a3800a4a49386dbf8292d0bd23ac7a57
                                                                                                                                                                                                                    • Instruction ID: f07fae74a765d54df6f00f5cb0f2670e407d3285aee9778c8faec1a81191918d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 509d8c3089a8338f69f02277a40f60c0a3800a4a49386dbf8292d0bd23ac7a57
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D0417E71A04204EFDB15DF94C884ADE7FB9EF44310F2481A9BD099F21AE7B1D945CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AB3E35
                                                                                                                                                                                                                    • IsMenu.USER32(?), ref: 00AB3E4A
                                                                                                                                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00AB3E92
                                                                                                                                                                                                                    • DrawMenuBar.USER32 ref: 00AB3EA5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                    • Opcode ID: 408056d30a02827a0955c809634483805e83e57efcf28667317746a456f845c1
                                                                                                                                                                                                                    • Instruction ID: e4f2a1b418cedb0631f44e05b5ce117fdfc89aaa686e44557edd0787bc46d4a4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 408056d30a02827a0955c809634483805e83e57efcf28667317746a456f845c1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E6410676A01249EFDF10DF94D884AEABBF9FF49354F04412AE905AB252D730EE45CB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A81E66
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A81E79
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A81EA9
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                    • Opcode ID: 50a2d5d2f54905fa11ee5ef5cd50df86d995d8c154508edd5902b3c2215d30cc
                                                                                                                                                                                                                    • Instruction ID: 1ad6228d9124028ddddace89b5c39cee4b38685983d4692b21817f7b3c96f830
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 50a2d5d2f54905fa11ee5ef5cd50df86d995d8c154508edd5902b3c2215d30cc
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5C212371A00104BEDB14ABA8ED55CFFBBBDEF45760F144529F821A31E1DB38490A8720
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                    • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                    • API String ID: 176396367-4004644295
                                                                                                                                                                                                                    • Opcode ID: ed07651598877a5edfc8d6e90648cab9a7af30db72b8fe44dbbaeb58c89254cb
                                                                                                                                                                                                                    • Instruction ID: cfc0e3a0d25f3b2b2457935dc89e678221dc5bd51f90801b4b645b7591354acd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ed07651598877a5edfc8d6e90648cab9a7af30db72b8fe44dbbaeb58c89254cb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9631E473A0056E8BEB21DF6D99401BF33939BA37E4B154029E855AB2C5EB71CE41D3A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00AB2F8D
                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 00AB2F94
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00AB2FA9
                                                                                                                                                                                                                    • DestroyWindow.USER32(?), ref: 00AB2FB1
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                    • String ID: SysAnimate32
                                                                                                                                                                                                                    • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                    • Opcode ID: 30f7d6b2ed427ecc983ae3390f7d38b9869ed0c2a4a2e0457101be4716dfbfe9
                                                                                                                                                                                                                    • Instruction ID: aabf54ff3e374682b7e32897e7f19f5ace8fa0512a28a66b42e46ee87bf41a4a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30f7d6b2ed427ecc983ae3390f7d38b9869ed0c2a4a2e0457101be4716dfbfe9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9F215871204205ABEB108FB49C84FFB77BDEB59364F10462AF950961A2D671DC619760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00A44D1E,00A528E9,?,00A44CBE,00A528E9,00AE88B8,0000000C,00A44E15,00A528E9,00000002), ref: 00A44D8D
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00A44DA0
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00A44D1E,00A528E9,?,00A44CBE,00A528E9,00AE88B8,0000000C,00A44E15,00A528E9,00000002,00000000), ref: 00A44DC3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                    • Opcode ID: 0cb53cd0eb3cc6dd41d9c1208bb9271fe2a13d8a909af72c84e73a1e863dcf18
                                                                                                                                                                                                                    • Instruction ID: 3553f487addc7749d0f3a1a2912d320a1c898383b495d14c8f38f4ee26fdc24d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0cb53cd0eb3cc6dd41d9c1208bb9271fe2a13d8a909af72c84e73a1e863dcf18
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4AF04F35A40208FBDB159FD4DC49FAEBBB9EF48762F0002A8F909A6261CB745941DB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A24EDD,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E9C
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A24EAE
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00A24EDD,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24EC0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 145871493-3689287502
                                                                                                                                                                                                                    • Opcode ID: 1d14c7363cfd46381b2640e824083253a6ff9b6ee0c63efefd9386933e5fcdcd
                                                                                                                                                                                                                    • Instruction ID: 06c4527b8bbeaa72c7c1216a158388488454dbe6424085e155f8d0284258406e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d14c7363cfd46381b2640e824083253a6ff9b6ee0c63efefd9386933e5fcdcd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5DE08636A056326BE231576DBC18E9F6558BF85F72B060725FC00E2212DBA4CD0340B0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00A63CDE,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E62
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A24E74
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00A63CDE,?,00AF1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00A24E87
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                    • API String ID: 145871493-1355242751
                                                                                                                                                                                                                    • Opcode ID: 8fb7eb18485dd56187a4b8bef15f0ebce914bd7a559a6702e8211c97118c9a48
                                                                                                                                                                                                                    • Instruction ID: 8cc0f4b7436539f47d2526146da270f255a06e5df8774fbe9fdcbae0a4dea693
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8fb7eb18485dd56187a4b8bef15f0ebce914bd7a559a6702e8211c97118c9a48
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9D0EC3650263267AA225B6D7C18DCF6A18AF89B613060B25F905A6136CB64CD0285A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A92C05
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00A92C87
                                                                                                                                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A92C9D
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A92CAE
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A92CC0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$Delete$Copy
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3226157194-0
                                                                                                                                                                                                                    • Opcode ID: 37d0959105a5c458c1076236d848cc4b9f52e961a1bcd38a56b19d503b9a16d1
                                                                                                                                                                                                                    • Instruction ID: 0346662d3ed7a2faa020fa1acb8cb66368c486603321fed95875447687afdc70
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 37d0959105a5c458c1076236d848cc4b9f52e961a1bcd38a56b19d503b9a16d1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 86B11D72E00129ABDF25EBA4CD85EDEBBBDEF49350F1040A6F509E7151EA309E448F61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00AAA427
                                                                                                                                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00AAA435
                                                                                                                                                                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00AAA468
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00AAA63D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3488606520-0
                                                                                                                                                                                                                    • Opcode ID: 71f68dbab6df07577d425fc4d9092777057e1a48455eaa8d0b889eab605d3d2b
                                                                                                                                                                                                                    • Instruction ID: ad16c8c78d3c20f1045c9adacf545b204fc10c6f4358b012339496828b6d7a9b
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 71f68dbab6df07577d425fc4d9092777057e1a48455eaa8d0b889eab605d3d2b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89A1C1716043019FD720DF28D986F2AB7E1AF98714F14882DF55A9B2D2D7B0ED41CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A8DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A8CF22,?), ref: 00A8DDFD
                                                                                                                                                                                                                      • Part of subcall function 00A8DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A8CF22,?), ref: 00A8DE16
                                                                                                                                                                                                                      • Part of subcall function 00A8E199: GetFileAttributesW.KERNEL32(?,00A8CF95), ref: 00A8E19A
                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00A8E473
                                                                                                                                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00A8E4AC
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8E5EB
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8E603
                                                                                                                                                                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00A8E650
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3183298772-0
                                                                                                                                                                                                                    • Opcode ID: 1cf78135011844af36d23a5779fb70f39105a7f81fac320949bd57b9e62ac9cf
                                                                                                                                                                                                                    • Instruction ID: 763b61ce46ce3328e6e6e5798aa130c3993e601d88cf777bcb8418234127effd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1cf78135011844af36d23a5779fb70f39105a7f81fac320949bd57b9e62ac9cf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E5153B24083459BC724EBA4DD819DFB3ECAFD4350F00492EF689D3191EF75A6888766
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00AAB6AE,?,?), ref: 00AAC9B5
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AAC9F1
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA68
                                                                                                                                                                                                                      • Part of subcall function 00AAC998: _wcslen.LIBCMT ref: 00AACA9E
                                                                                                                                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00AABAA5
                                                                                                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00AABB00
                                                                                                                                                                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00AABB63
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 00AABBA6
                                                                                                                                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00AABBB3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 826366716-0
                                                                                                                                                                                                                    • Opcode ID: 65d2fc0e0d62b115eed6923605b36f10864a2c3a28bec5faeac4a1260c53c502
                                                                                                                                                                                                                    • Instruction ID: bc45c842b670b7eda9f2f346cd8c1af470088f54da60106d6b8c0ddd006d911e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 65d2fc0e0d62b115eed6923605b36f10864a2c3a28bec5faeac4a1260c53c502
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DC61A131218241EFD314DF54C490E2ABBE5FF85358F14856CF4998B2A2DB31ED45CBA2
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • VariantInit.OLEAUT32(?), ref: 00A88BCD
                                                                                                                                                                                                                    • VariantClear.OLEAUT32 ref: 00A88C3E
                                                                                                                                                                                                                    • VariantClear.OLEAUT32 ref: 00A88C9D
                                                                                                                                                                                                                    • VariantClear.OLEAUT32(?), ref: 00A88D10
                                                                                                                                                                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A88D3B
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4136290138-0
                                                                                                                                                                                                                    • Opcode ID: 246a5c76ce1967c7f8ed694851bf7142be689ab18f397778a9e380cc951d9803
                                                                                                                                                                                                                    • Instruction ID: 5176d09bd21caa1136d84ba9e8c9d7006984e42ec999741c88f0fa5d331c3299
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 246a5c76ce1967c7f8ed694851bf7142be689ab18f397778a9e380cc951d9803
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 995159B5A00219EFCB14DF68C894EAAB7F8FF89310B158559E905DB354EB34E912CF90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A98BAE
                                                                                                                                                                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00A98BDA
                                                                                                                                                                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A98C32
                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A98C57
                                                                                                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A98C5F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2832842796-0
                                                                                                                                                                                                                    • Opcode ID: 7d865445e0bca52a9190957e9e231c57967214f6716f8b28372f3ba23ca0e831
                                                                                                                                                                                                                    • Instruction ID: 37f447386cacf8f674d674b1beaa327051761070cfdd15450182c4e2567b157e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 7d865445e0bca52a9190957e9e231c57967214f6716f8b28372f3ba23ca0e831
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4B511835A002159FCB05DF64D981A6DBBF5BF49314F088468E84AAB362DB35ED51CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00AA8F40
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00AA8FD0
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00AA8FEC
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00AA9032
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00AA9052
                                                                                                                                                                                                                      • Part of subcall function 00A3F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00A91043,?,753CE610), ref: 00A3F6E6
                                                                                                                                                                                                                      • Part of subcall function 00A3F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00A7FA64,00000000,00000000,?,?,00A91043,?,753CE610,?,00A7FA64), ref: 00A3F70D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 666041331-0
                                                                                                                                                                                                                    • Opcode ID: 89aa6c6d532c9cfaf08c0264a8d60be60bedd861d321ea5b247f84cc7ced8a86
                                                                                                                                                                                                                    • Instruction ID: cbdc7731b93ca0a9904068af085e355cedcdd7ab6d1111f80d49e0647516962f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89aa6c6d532c9cfaf08c0264a8d60be60bedd861d321ea5b247f84cc7ced8a86
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A9512C35600215DFC715DF58C5848AEBBF1FF49324F0481A9E806AB3A2DB31ED86CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00AB6C33
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00AB6C4A
                                                                                                                                                                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00AB6C73
                                                                                                                                                                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00A9AB79,00000000,00000000), ref: 00AB6C98
                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00AB6CC7
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3688381893-0
                                                                                                                                                                                                                    • Opcode ID: f6d4d3f01a7b2fe5b2c53890ad181bd9561dffbc982c4708e610c0e3a7b7c80c
                                                                                                                                                                                                                    • Instruction ID: ab3f6e2949ffd9141f8d0325bececf3972be7eccd3efcbc33e3a1f2296199084
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f6d4d3f01a7b2fe5b2c53890ad181bd9561dffbc982c4708e610c0e3a7b7c80c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F741A135604104AFD724CF68CD58FE97FA9EB0A360F140268E995A72A2C379AD41DA90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 269201875-0
                                                                                                                                                                                                                    • Opcode ID: cd3f4205060eabf973fb7634c99f6f74e6eb4688a75ea57f2c0bb03206c0ae05
                                                                                                                                                                                                                    • Instruction ID: 8ac05b1e4e234e31ca54d49ff2489708bd6f56e2b9da118b74127cb5be3a6b6d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cd3f4205060eabf973fb7634c99f6f74e6eb4688a75ea57f2c0bb03206c0ae05
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8641B232A00200AFCB24DFB8C981B5EB7B5FF8A325F154569E915EB392D731AD05CB80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00A39141
                                                                                                                                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00A3915E
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00A39183
                                                                                                                                                                                                                    • GetAsyncKeyState.USER32(00000002), ref: 00A3919D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4210589936-0
                                                                                                                                                                                                                    • Opcode ID: d4bb26fce40a0117175ff6f9934fb20dc282a5abb86e8b6d02a7235334ebee0a
                                                                                                                                                                                                                    • Instruction ID: 298edfc606b49f0839dc23afe0ee4d925b370f7cbca381dc4528d22dffe53e63
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d4bb26fce40a0117175ff6f9934fb20dc282a5abb86e8b6d02a7235334ebee0a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 70414D31A0861ABBDF159F64C848BEEB774FB05320F20832AF429A72A1C7706950CF91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetInputState.USER32 ref: 00A938CB
                                                                                                                                                                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00A93922
                                                                                                                                                                                                                    • TranslateMessage.USER32(?), ref: 00A9394B
                                                                                                                                                                                                                    • DispatchMessageW.USER32(?), ref: 00A93955
                                                                                                                                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A93966
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2256411358-0
                                                                                                                                                                                                                    • Opcode ID: 91c03c93353bd05faf9ffcba6bb9f127bf4a0819a909b37924eb7bf3876a87c1
                                                                                                                                                                                                                    • Instruction ID: 945c00f5af6e92e0ffadead7e98c16a205df1ddbbae5709346be39de808449fb
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 91c03c93353bd05faf9ffcba6bb9f127bf4a0819a909b37924eb7bf3876a87c1
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2131F572B04341DEEF35CBB49868FB637F8AB11300F04466DE466C61A0E7F4AA86CB11
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00A9C21E,00000000), ref: 00A9CF38
                                                                                                                                                                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00A9CF6F
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,00A9C21E,00000000), ref: 00A9CFB4
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A9C21E,00000000), ref: 00A9CFC8
                                                                                                                                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00A9C21E,00000000), ref: 00A9CFF2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3191363074-0
                                                                                                                                                                                                                    • Opcode ID: 433f6fc56b3a68aa3553fb5e94c725cb6a92a11b06a1925b4b64e87e02cd2cb5
                                                                                                                                                                                                                    • Instruction ID: 3d9f0e524807668576269e9105487c8abd50f3abf001b960841283adf6f5a0c2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 433f6fc56b3a68aa3553fb5e94c725cb6a92a11b06a1925b4b64e87e02cd2cb5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 74313971A04B05EFDF20DFA5C988EABBBF9EB14365B10442EF516D2151EB30AE41DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00A81915
                                                                                                                                                                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 00A819C1
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 00A819C9
                                                                                                                                                                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 00A819DA
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00A819E2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3382505437-0
                                                                                                                                                                                                                    • Opcode ID: 4c15a33f330599f31c3ccabb38b6bfc5cdd90b93245124a8f7c7c5cef988ae5e
                                                                                                                                                                                                                    • Instruction ID: 45fae58bda5a2d6a776dee2e53aaf323528771df5ae8ebb60ddf1cdce75cb841
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4c15a33f330599f31c3ccabb38b6bfc5cdd90b93245124a8f7c7c5cef988ae5e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9C31BF71A00219EFCB00DFA8CD99EEE3BB9EB04325F104329F961A72D1D7B09955CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00AB5745
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00AB579D
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB57AF
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB57BA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00AB5816
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 763830540-0
                                                                                                                                                                                                                    • Opcode ID: 6bad71f852f011a6079ebd286d275037a61f5a555e412891591b78b6f10ef1e6
                                                                                                                                                                                                                    • Instruction ID: f73fff669581cd393c1ce8df02f428be17b295594c44976bac964f551c50f147
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6bad71f852f011a6079ebd286d275037a61f5a555e412891591b78b6f10ef1e6
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 85216F75D04618AADB209FB0CC85BEE77BCFF44724F108616E929AA182D7749986CF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • IsWindow.USER32(00000000), ref: 00AA0951
                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00AA0968
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00AA09A4
                                                                                                                                                                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 00AA09B0
                                                                                                                                                                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 00AA09E8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4156661090-0
                                                                                                                                                                                                                    • Opcode ID: 4ac077471a64053ae144cdf82a6acda2dfa6dcc7890513e554145907de70cebf
                                                                                                                                                                                                                    • Instruction ID: d54de60497d365c650d85dc83722b7e03fb12fe7865170427529d377bcc8817e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4ac077471a64053ae144cdf82a6acda2dfa6dcc7890513e554145907de70cebf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C1218135600214AFD704EFA9D995EAEBBF9EF49710F048168F85A97762CB30AC05CB50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 00A5CDC6
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00A5CDE9
                                                                                                                                                                                                                      • Part of subcall function 00A53820: RtlAllocateHeap.NTDLL(00000000,?,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6,?,00A21129), ref: 00A53852
                                                                                                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00A5CE0F
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5CE22
                                                                                                                                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00A5CE31
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 336800556-0
                                                                                                                                                                                                                    • Opcode ID: 45aaab6c00982ea23f889e9a4bf87ee3e5b048a546f5875c6f1e22ecfdf8bcf8
                                                                                                                                                                                                                    • Instruction ID: 3ece49be362751a0857ab69592f8f366f5d5cd6368eecae0585bb978992a3851
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 45aaab6c00982ea23f889e9a4bf87ee3e5b048a546f5875c6f1e22ecfdf8bcf8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 740124726013117FA32157BA6C8AC7B6A6CFEC2FB23140229FD01D7215EA308D0681B0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A39693
                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00A396A2
                                                                                                                                                                                                                    • BeginPath.GDI32(?), ref: 00A396B9
                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00A396E2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3225163088-0
                                                                                                                                                                                                                    • Opcode ID: 98224c890e8c3372cd55bda66e495f2b85bf9e4a703714bfc17be92b696f21bd
                                                                                                                                                                                                                    • Instruction ID: 12387a2b78e07917a66717fa47d9b0855b84ee579ccbb8ef075168dd9c40745a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 98224c890e8c3372cd55bda66e495f2b85bf9e4a703714bfc17be92b696f21bd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D0213A70802205EBDB11DFE9ED99BBA7BA8BB50365F104216F814A61B1D3F09892CFD4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSysColor.USER32(00000008), ref: 00A398CC
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 00A398D6
                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00A398E9
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000005), ref: 00A398F1
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00A39952
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Color$LongModeObjectStockTextWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1860813098-0
                                                                                                                                                                                                                    • Opcode ID: d10f54d69af288632bb4e4138baf2f6d1247e8d1b0344aa5a77875f80c4e0f95
                                                                                                                                                                                                                    • Instruction ID: 43252e1ac169bc5ecb3a4ae43988ab97cd3f60af4a6f4eadd4c2a6dc0cb396e6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d10f54d69af288632bb4e4138baf2f6d1247e8d1b0344aa5a77875f80c4e0f95
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8E113832146250AFC7128FA5ECA5FEB3B74EF57721B180299F5429B1B2C7B10941CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _memcmp
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2931989736-0
                                                                                                                                                                                                                    • Opcode ID: 9565ece18430bb6172264a7dc4083bb41df3e75c04d35e9fa833aa41dc84e3cb
                                                                                                                                                                                                                    • Instruction ID: 82043ded9c635bf57ba4cf361f33a2248fc4329fcdebf7ec6474641f43f0c085
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9565ece18430bb6172264a7dc4083bb41df3e75c04d35e9fa833aa41dc84e3cb
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2B01B579A41609BFE6086620DE82FFB735CAF61394F448830FD04AE242F760FD5083A4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,?,?,00A4F2DE,00A53863,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6), ref: 00A52DFD
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52E32
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52E59
                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,00A21129), ref: 00A52E66
                                                                                                                                                                                                                    • SetLastError.KERNEL32(00000000,00A21129), ref: 00A52E6F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$_free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3170660625-0
                                                                                                                                                                                                                    • Opcode ID: 5e1f9cae3ef93b1d37f82e2e118186ea307ed20f439bb8820cbd9a4d69a2e035
                                                                                                                                                                                                                    • Instruction ID: 00239c068fcc9eab5b58e85461320ddc35551e8e852b3f998617941d836b991e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5e1f9cae3ef93b1d37f82e2e118186ea307ed20f439bb8820cbd9a4d69a2e035
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4301F932105A0067C61267B47D47F6B2A69BBD33B7B254129FC21A7293EE349C0E4320
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?,?,00A8035E), ref: 00A8002B
                                                                                                                                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?), ref: 00A80046
                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?), ref: 00A80054
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?), ref: 00A80064
                                                                                                                                                                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00A7FF41,80070057,?,?), ref: 00A80070
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3897988419-0
                                                                                                                                                                                                                    • Opcode ID: 1fc3c4a5178761c4a95e68c15a2a8099beb9d6f1c2d81b35ac5951669985293e
                                                                                                                                                                                                                    • Instruction ID: c0f675b9374d4be17d82016e9df6530ef5b6b81800666bc77929657e43da436a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1fc3c4a5178761c4a95e68c15a2a8099beb9d6f1c2d81b35ac5951669985293e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 53018B72600204BFDB51AFA8DC04FAA7AFDEF447A2F144224F905D6221E771DD459BA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 00A8E997
                                                                                                                                                                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 00A8E9A5
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 00A8E9AD
                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 00A8E9B7
                                                                                                                                                                                                                    • Sleep.KERNEL32 ref: 00A8E9F3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2833360925-0
                                                                                                                                                                                                                    • Opcode ID: 0754e66b696db1ffff329b6374941b8571214a5d2c676365424754f96e55705c
                                                                                                                                                                                                                    • Instruction ID: 0a79194addd729ea386120318c7128a82eb7c31374be4543d8ba878a13e624a3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0754e66b696db1ffff329b6374941b8571214a5d2c676365424754f96e55705c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1015331C01629DBCF00EBE9ED49AEDFB78BB08311F000646E942B2252CB7096528BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A81114
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81120
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A8112F
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00A80B9B,?,?,?), ref: 00A81136
                                                                                                                                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A8114D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 842720411-0
                                                                                                                                                                                                                    • Opcode ID: 08f1d0142abf22e3560f4b26f233e3593fecaa745bcbb96ac80b83ddf0a70df8
                                                                                                                                                                                                                    • Instruction ID: 2f9f2676bb8148be5120c4a6c522d6921ca790c244d195d3c7dfabeb09b95c66
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 08f1d0142abf22e3560f4b26f233e3593fecaa745bcbb96ac80b83ddf0a70df8
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 32016D75100205BFDB119FA4DC4DEAA3B6EEF85364B100519FA41D7361DA31DC418B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A80FCA
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A80FD6
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A80FE5
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A80FEC
                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A81002
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 44706859-0
                                                                                                                                                                                                                    • Opcode ID: 63e5ac3a81ee00e35a4f9c79e9173ebb52b6d7425a61f871450474aeb079327c
                                                                                                                                                                                                                    • Instruction ID: a8aecb93f1b4fe04071efb7125223f1f0d11044a76d8c994ed25ae213279edb8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 63e5ac3a81ee00e35a4f9c79e9173ebb52b6d7425a61f871450474aeb079327c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 17F04975600311ABDB21AFA8AC49F563BADEF89762F104525FA46D6262CA70DC428A60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A8102A
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A81036
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A81045
                                                                                                                                                                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A8104C
                                                                                                                                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A81062
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 44706859-0
                                                                                                                                                                                                                    • Opcode ID: 34c9bbf78834fe1c41e645520011feca0d889318323d5b37718d67e1889372ae
                                                                                                                                                                                                                    • Instruction ID: fb6dc422acaeb63bc28a1445532f3d4cdaea4e2e12784f197a5331c70c0536fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 34c9bbf78834fe1c41e645520011feca0d889318323d5b37718d67e1889372ae
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9EF06D75200311EBDB21AFE8EC49F573BADFF89761F500525FA45D7262CA70D8428B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A90324
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A90331
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A9033E
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A9034B
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A90358
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00A9017D,?,00A932FC,?,00000001,00A62592,?), ref: 00A90365
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseHandle
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2962429428-0
                                                                                                                                                                                                                    • Opcode ID: 1b887152815f020a54b06e2b07aa61726b0323d66198f85caa3dad083d69c136
                                                                                                                                                                                                                    • Instruction ID: ac031054644b8330c026f9582837ab60fff8ff9798dae357822aecac8dfeac38
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1b887152815f020a54b06e2b07aa61726b0323d66198f85caa3dad083d69c136
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9201EE72900B019FCB30AF6AD880803FBF9BF603553048A3FD19692931C3B0A948CF80
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D752
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D764
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D776
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D788
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5D79A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                    • Opcode ID: 9247443d2fcd6cf0f9b2d50afb6bbd6d461381d9ea898133eaa3a8c590457258
                                                                                                                                                                                                                    • Instruction ID: 1e7fc3152e31e893107f91ee108ad88a7b424ad6186815651d797afb1e53dbb3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9247443d2fcd6cf0f9b2d50afb6bbd6d461381d9ea898133eaa3a8c590457258
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FF01232544248EBC635EBA8FAC5D567BDDBB497227A40C05F858EB603C730FC858764
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00A85C58
                                                                                                                                                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A85C6F
                                                                                                                                                                                                                    • MessageBeep.USER32(00000000), ref: 00A85C87
                                                                                                                                                                                                                    • KillTimer.USER32(?,0000040A), ref: 00A85CA3
                                                                                                                                                                                                                    • EndDialog.USER32(?,00000001), ref: 00A85CBD
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3741023627-0
                                                                                                                                                                                                                    • Opcode ID: e7483c014418cd559e7f78b9cb237f00cc10330fa568d2a8e3008c6dfe1d439b
                                                                                                                                                                                                                    • Instruction ID: 443cb7eaba59a051c8546cd4873eada6706fb8f2a4df7c456448447b440db3e2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e7483c014418cd559e7f78b9cb237f00cc10330fa568d2a8e3008c6dfe1d439b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 72018B705007049BEB256B60DD5EFA577B8BB00705F001659A583614F1DBF099959F50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A522BE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000), ref: 00A529DE
                                                                                                                                                                                                                      • Part of subcall function 00A529C8: GetLastError.KERNEL32(00000000,?,00A5D7D1,00000000,00000000,00000000,00000000,?,00A5D7F8,00000000,00000007,00000000,?,00A5DBF5,00000000,00000000), ref: 00A529F0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A522D0
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A522E3
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A522F4
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A52305
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 776569668-0
                                                                                                                                                                                                                    • Opcode ID: cea86d5ae63f5c2d4e69297e4a64612cca9cfb4d86ec60e37ea4c9b2ff4d23cf
                                                                                                                                                                                                                    • Instruction ID: 2ab60db35741ab6c2efd21d0e1610e914885b0d2344ae8717b4bd04f5087b7b6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cea86d5ae63f5c2d4e69297e4a64612cca9cfb4d86ec60e37ea4c9b2ff4d23cf
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8F03A74800120DBCA12EFD8BD41EAC7B64B75A762B00055AF820E63B3C7310817EFE4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 00A395D4
                                                                                                                                                                                                                    • StrokeAndFillPath.GDI32(?,?,00A771F7,00000000,?,?,?), ref: 00A395F0
                                                                                                                                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00A39603
                                                                                                                                                                                                                    • DeleteObject.GDI32 ref: 00A39616
                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 00A39631
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2625713937-0
                                                                                                                                                                                                                    • Opcode ID: d58759883f4e58e0642f21035c838b586d7d89114dee5a87be3b7ffa4f12abb0
                                                                                                                                                                                                                    • Instruction ID: 3ad4ae23337ba2bc3e5c21d324d662d9c37b9282d088eb23b628553c83538e89
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d58759883f4e58e0642f21035c838b586d7d89114dee5a87be3b7ffa4f12abb0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9F01930006204EBDB12EFE9ED58B7A3B65AB10332F448314F465550F1C7B08996DFA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: __freea$_free
                                                                                                                                                                                                                    • String ID: a/p$am/pm
                                                                                                                                                                                                                    • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                    • Opcode ID: 693295f2614f9e832e77034bcbe6aba22f23f4231e33fb12cd038220f53a6325
                                                                                                                                                                                                                    • Instruction ID: a691776a77bc43f0dd27cfb373c334ab6234bf24f4438052782b5173dcc152a6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 693295f2614f9e832e77034bcbe6aba22f23f4231e33fb12cd038220f53a6325
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FFD13671900206DACB649F68C8A5BFEB7B0FF05722F28026DED019F691D3759D88CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A40242: EnterCriticalSection.KERNEL32(00AF070C,00AF1884,?,?,00A3198B,00AF2518,?,?,?,00A212F9,00000000), ref: 00A4024D
                                                                                                                                                                                                                      • Part of subcall function 00A40242: LeaveCriticalSection.KERNEL32(00AF070C,?,00A3198B,00AF2518,?,?,?,00A212F9,00000000), ref: 00A4028A
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A400A3: __onexit.LIBCMT ref: 00A400A9
                                                                                                                                                                                                                    • __Init_thread_footer.LIBCMT ref: 00AA7BFB
                                                                                                                                                                                                                      • Part of subcall function 00A401F8: EnterCriticalSection.KERNEL32(00AF070C,?,?,00A38747,00AF2514), ref: 00A40202
                                                                                                                                                                                                                      • Part of subcall function 00A401F8: LeaveCriticalSection.KERNEL32(00AF070C,?,00A38747,00AF2514), ref: 00A40235
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                    • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                    • API String ID: 535116098-3733170431
                                                                                                                                                                                                                    • Opcode ID: 632197f2e317de8990588c0cf15033ee78398c2091b552740965081a88e1562c
                                                                                                                                                                                                                    • Instruction ID: d80dd4bc2fbac29afe80ec57710286f15446b467154b626d5a95b2bf53682d56
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 632197f2e317de8990588c0cf15033ee78398c2091b552740965081a88e1562c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CB918B75A04209EFCB14EF98D991DBEB7B1FF4A300F108059F906AB292DB71AE45CB51
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A8B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A821D0,?,?,00000034,00000800,?,00000034), ref: 00A8B42D
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A82760
                                                                                                                                                                                                                      • Part of subcall function 00A8B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00A8B3F8
                                                                                                                                                                                                                      • Part of subcall function 00A8B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00A8B355
                                                                                                                                                                                                                      • Part of subcall function 00A8B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A82194,00000034,?,?,00001004,00000000,00000000), ref: 00A8B365
                                                                                                                                                                                                                      • Part of subcall function 00A8B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A82194,00000034,?,?,00001004,00000000,00000000), ref: 00A8B37B
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A827CD
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A8281A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                    • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                    • Opcode ID: 5173e7c8b94c771706e8785fec61fda82881efa421cfed65dde5c52fcb9da1ed
                                                                                                                                                                                                                    • Instruction ID: 059488a69368eec72d31b412e89e8d0a623396ec8f20385f3c8fd40479d1d46a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5173e7c8b94c771706e8785fec61fda82881efa421cfed65dde5c52fcb9da1ed
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67410972900218AFDB10EFA4C956FEEBBB8EB09700F104095EA55B7191DA706E45CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00A51769
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A51834
                                                                                                                                                                                                                    • _free.LIBCMT ref: 00A5183E
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free$FileModuleName
                                                                                                                                                                                                                    • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                    • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                    • Opcode ID: 871ff06324b74e54552ca4fe0a06806da2331af9a026177799a2b7a330889eec
                                                                                                                                                                                                                    • Instruction ID: c49b4e0c2212fc09428a9fb64cdb0bdf2b0cfd52f00879be9b3a8b44d8a4d1c2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 871ff06324b74e54552ca4fe0a06806da2331af9a026177799a2b7a330889eec
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 39316E75A00218EFDB21DBD99D85EAEBBFCFB99311B144166FC0497211D6B08E49CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A8C306
                                                                                                                                                                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 00A8C34C
                                                                                                                                                                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00AF1990,014D5B58), ref: 00A8C395
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 135850232-4108050209
                                                                                                                                                                                                                    • Opcode ID: ab59f3b6bed8d2d7b8a2b715b0641d112ce56e6ebda8160b767c160c4687ff9f
                                                                                                                                                                                                                    • Instruction ID: 16f66e78b5e1f6b13a9d51dfcc05b9fa8fafca6ab67f50f6fb611700272fd46d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ab59f3b6bed8d2d7b8a2b715b0641d112ce56e6ebda8160b767c160c4687ff9f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 62419F712043019FD724EF29D884B5ABBE4EF85320F148A2DF9A59B2D1D730E906DF62
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00ABCC08,00000000,?,?,?,?), ref: 00AB44AA
                                                                                                                                                                                                                    • GetWindowLongW.USER32 ref: 00AB44C7
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00AB44D7
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Long
                                                                                                                                                                                                                    • String ID: SysTreeView32
                                                                                                                                                                                                                    • API String ID: 847901565-1698111956
                                                                                                                                                                                                                    • Opcode ID: 9f7930abf71df9020ae526c5a329cd956b4c13842cec45affc3af941e60fdc3a
                                                                                                                                                                                                                    • Instruction ID: 021af1f45331d428acd95796bd460c2236ad161b780ca43546d70dcd2486d089
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9f7930abf71df9020ae526c5a329cd956b4c13842cec45affc3af941e60fdc3a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 56316B31210605AFDB219F78DC45FEA7BA9EB09334F204725F979921E2D770EC619B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00AA335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00AA3077,?,?), ref: 00AA3378
                                                                                                                                                                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00AA307A
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AA309B
                                                                                                                                                                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00AA3106
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                    • String ID: 255.255.255.255
                                                                                                                                                                                                                    • API String ID: 946324512-2422070025
                                                                                                                                                                                                                    • Opcode ID: 31332bab7645909a45f873d969dbe866b3b0576beafcb18dd9cc17807f90ed50
                                                                                                                                                                                                                    • Instruction ID: b9aa134fc3836db7b8f6578ddb1efe3039b5942a2dd9f0ad70c5b01297ce8286
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 31332bab7645909a45f873d969dbe866b3b0576beafcb18dd9cc17807f90ed50
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: CA31923A6042059FCF10CF68C585E6A77E0EF56314F248159F9158B3D2DB71DE45C761
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00AB3F40
                                                                                                                                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00AB3F54
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00AB3F78
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$Window
                                                                                                                                                                                                                    • String ID: SysMonthCal32
                                                                                                                                                                                                                    • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                    • Opcode ID: e3b986f760928e73a7fcd12ad1106c80dc665f6c174fdeadf7b0b7fc09ab3b0c
                                                                                                                                                                                                                    • Instruction ID: e79101559c131f2587fa64010b60ca35c82a0bcd8ca1cc183fa10072837bceb4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: e3b986f760928e73a7fcd12ad1106c80dc665f6c174fdeadf7b0b7fc09ab3b0c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E221AB33600219BBDF21CFA4DC46FEA3B79EB48724F110214FA156B191D6B5A851CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00AB4705
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00AB4713
                                                                                                                                                                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00AB471A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                    • String ID: msctls_updown32
                                                                                                                                                                                                                    • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                    • Opcode ID: 4a7682ba2d1db995f47315e2c4a28f55ca8b6cc2d98433af186e93c4b7d0dff0
                                                                                                                                                                                                                    • Instruction ID: 086bcaf3753e1926c08f9dd623a147ecf92b5ebec2e50f78d8ba4e7893ebb43f
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4a7682ba2d1db995f47315e2c4a28f55ca8b6cc2d98433af186e93c4b7d0dff0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 462160B5600208AFEB10DF68DCD1DB737ADEB5E3A4B040159FA009B262DB71EC52DA60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                    • API String ID: 176396367-2734436370
                                                                                                                                                                                                                    • Opcode ID: 52f29c992f8f6115289b2d77638716d65610a3edd072f3ff6db0407886a779db
                                                                                                                                                                                                                    • Instruction ID: 12d82825be10a53ccace951b18f03aaa5be5e09c8cf08533a57d89fdedd4ac25
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 52f29c992f8f6115289b2d77638716d65610a3edd072f3ff6db0407886a779db
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FF215732204620AAD335BB28ED02FBB73ECAF91300F18443AF94997082FB55EE45C395
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00AB3840
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00AB3850
                                                                                                                                                                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00AB3876
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                    • String ID: Listbox
                                                                                                                                                                                                                    • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                    • Opcode ID: bca69e549ed63bed8d9bf1c26f10c2f6b4e3a501a984a09e4c85ee8ff6313f6c
                                                                                                                                                                                                                    • Instruction ID: 9338b7e83b93093eb8f12929ab5d17cfd71590c66945a7488d429fdb1c909617
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bca69e549ed63bed8d9bf1c26f10c2f6b4e3a501a984a09e4c85ee8ff6313f6c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 37218B72610218BBEF21CFA5DC85EFB376EEF89760F118124F9059B191CA75DC528BA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00A94A08
                                                                                                                                                                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A94A5C
                                                                                                                                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,00ABCC08), ref: 00A94AD0
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                    • String ID: %lu
                                                                                                                                                                                                                    • API String ID: 2507767853-685833217
                                                                                                                                                                                                                    • Opcode ID: 97d7e352d67ea7f88be66dc2815f31f3f80e0f73ceb28fa1557e83dcc58cf321
                                                                                                                                                                                                                    • Instruction ID: 6babdce6b214dd66f3e64437ae6765ed290be3cb93cf947f1f99e37bbfbaafbd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 97d7e352d67ea7f88be66dc2815f31f3f80e0f73ceb28fa1557e83dcc58cf321
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5B317371A00108AFDB10DF58C985EAA7BF8EF08318F1440A5F505EB262D771ED46CB61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00AB424F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00AB4264
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00AB4271
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                    • String ID: msctls_trackbar32
                                                                                                                                                                                                                    • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                    • Opcode ID: dc4ceeaf2261ec996719d77ac9d685980af9d1d979ea4e4300184e40d1f34710
                                                                                                                                                                                                                    • Instruction ID: 95fe6810ff550fa7aa5c6496509a78eb9614d043d34d1cfb2bf6dd66a01a0048
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: dc4ceeaf2261ec996719d77ac9d685980af9d1d979ea4e4300184e40d1f34710
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0E11E371240248BEEF209F69CC06FEB3BACEF99B64F010624FA55E20A2D271DC119B50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A26B57: _wcslen.LIBCMT ref: 00A26B6A
                                                                                                                                                                                                                      • Part of subcall function 00A82DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A82DC5
                                                                                                                                                                                                                      • Part of subcall function 00A82DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A82DD6
                                                                                                                                                                                                                      • Part of subcall function 00A82DA7: GetCurrentThreadId.KERNEL32 ref: 00A82DDD
                                                                                                                                                                                                                      • Part of subcall function 00A82DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A82DE4
                                                                                                                                                                                                                    • GetFocus.USER32 ref: 00A82F78
                                                                                                                                                                                                                      • Part of subcall function 00A82DEE: GetParent.USER32(00000000), ref: 00A82DF9
                                                                                                                                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00A82FC3
                                                                                                                                                                                                                    • EnumChildWindows.USER32(?,00A8303B), ref: 00A82FEB
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                    • String ID: %s%d
                                                                                                                                                                                                                    • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                    • Opcode ID: 2e20a0d3bb46aaa2ea71dc9a182e79aacba5ce51a6471300858435471d34a61a
                                                                                                                                                                                                                    • Instruction ID: 1c96632aadc0318999e1664c90ca4814e9eef5a97f79dfd432886df2bee1e330
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2e20a0d3bb46aaa2ea71dc9a182e79aacba5ce51a6471300858435471d34a61a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6411B1766002056BCF15BFB49D95FFE3B6AAF94314F048075F9099B292DE309A4A8B70
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00AB58C1
                                                                                                                                                                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00AB58EE
                                                                                                                                                                                                                    • DrawMenuBar.USER32(?), ref: 00AB58FD
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                    • String ID: 0
                                                                                                                                                                                                                    • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                    • Opcode ID: 8f3d6abe2c97133f94380642ff062077a06b01617507b9dc9b6589c132fceb3a
                                                                                                                                                                                                                    • Instruction ID: 6929449a48ba8193bd45223827ec88b0076d938e4105bda080d5094f4b6f04c5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8f3d6abe2c97133f94380642ff062077a06b01617507b9dc9b6589c132fceb3a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E1016D31900218EFDB219F61DC44FEEBBB9FB45360F1480AAF849D6162DB308A94DF21
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00A7D3BF
                                                                                                                                                                                                                    • FreeLibrary.KERNEL32 ref: 00A7D3E5
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                    • API String ID: 3013587201-2590602151
                                                                                                                                                                                                                    • Opcode ID: f17b0c8388a2f6da9a8957bcc6aba764ebb422db51b9b319f18b99d6f1d5ebba
                                                                                                                                                                                                                    • Instruction ID: a2b5b6d48f45692e57021ddcd0dad69558de524ff08a503c510147da2e57297e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f17b0c8388a2f6da9a8957bcc6aba764ebb422db51b9b319f18b99d6f1d5ebba
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DBF0AB32802A20EBD37143148C54EED7338AF00B02F55C714F80EF9057EB60CD4282D2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: c8a2b780aa5baabe7517d4db4b8ac1fc8c931dda603181471a7269f613f0707a
                                                                                                                                                                                                                    • Instruction ID: db5093fe4c532e0b3f8a28573768c2a922896a9658bca907f52013843feef000
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c8a2b780aa5baabe7517d4db4b8ac1fc8c931dda603181471a7269f613f0707a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 67C16875A0020AAFDB54DFA8C888EAEB7B5FF48314F218598E505EF251D770EE45CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1036877536-0
                                                                                                                                                                                                                    • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                    • Instruction ID: 246cbe646ff071c0ce3b464f63921c0e43544fefbe7a3a720103e6acfa0aecd4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03A15972D007869FEB15CF18C8917AEBBF4FF69395F28426DE9459B281C2388989C750
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1998397398-0
                                                                                                                                                                                                                    • Opcode ID: d1ff03e77337b3571efbd0432562e0c0047630dac505bb3c1d024a1934e37ae7
                                                                                                                                                                                                                    • Instruction ID: 55f22fd433b76fc898128229bd7f3a5dccf5dd85777ee88f9ebcb8c0503e58fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d1ff03e77337b3571efbd0432562e0c0047630dac505bb3c1d024a1934e37ae7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C8A13C756043119FCB00DF28D585A2EB7E5FF89714F148859F98A9B3A2DB30EE01CB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00ABFC08,?), ref: 00A805F0
                                                                                                                                                                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00ABFC08,?), ref: 00A80608
                                                                                                                                                                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,00ABCC40,000000FF,?,00000000,00000800,00000000,?,00ABFC08,?), ref: 00A8062D
                                                                                                                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 00A8064E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 314563124-0
                                                                                                                                                                                                                    • Opcode ID: 640712b83a6a520d2168dafc9934aedbed491151786c2ed2098c064231af91cd
                                                                                                                                                                                                                    • Instruction ID: 58d102f66a9f60f3f12c9c395b80791688470d9851eb2b523c0d7fc4b3887866
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 640712b83a6a520d2168dafc9934aedbed491151786c2ed2098c064231af91cd
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03811D71A00109EFCB44DFD4C984DEEB7B9FF89315F244568E506AB250DB71AE0ACB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00AAA6AC
                                                                                                                                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00AAA6BA
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00AAA79C
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AAA7AB
                                                                                                                                                                                                                      • Part of subcall function 00A3CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00A63303,?), ref: 00A3CE8A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1991900642-0
                                                                                                                                                                                                                    • Opcode ID: ce9ef2e5f04686a79662d0fbf1e39868b53093b1b41d3b398c7ca62da64c9594
                                                                                                                                                                                                                    • Instruction ID: 710ff541ca2bf5a26254af913c452c2cf07e2bc14266cb4348f765d72eb90a42
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce9ef2e5f04686a79662d0fbf1e39868b53093b1b41d3b398c7ca62da64c9594
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 73514E71508310AFD710EF28D986E6BBBE8FF99754F00492DF595972A2EB30D904CB92
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _free
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 269201875-0
                                                                                                                                                                                                                    • Opcode ID: bba654181ab21a33156b9aa660fe60f3dc2d74551f0a6cd5846081861ee17e75
                                                                                                                                                                                                                    • Instruction ID: df9290431ffad95034ef768128d8efacb90feb42078aab4d0fb2c3bc69912867
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bba654181ab21a33156b9aa660fe60f3dc2d74551f0a6cd5846081861ee17e75
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F9412F75A00510ABDB21BBFD9D4A6BE3EB4FF81370F1C4225F819D7292EA7488415361
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AB62E2
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB6315
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00AB6382
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3880355969-0
                                                                                                                                                                                                                    • Opcode ID: c1c72446a5daab89e6465780d936ead488f839628006172075180b63b5706621
                                                                                                                                                                                                                    • Instruction ID: 98a706af9fb6df2b87cedf724bf91130bcd5f70194f85bc4aa070125a67f4a65
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c1c72446a5daab89e6465780d936ead488f839628006172075180b63b5706621
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6F511A74A00209EFDB10DF68D9809EE7BF9FB55360F108269F9159B2A2D774ED81CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00AA1AFD
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1B0B
                                                                                                                                                                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00AA1B8A
                                                                                                                                                                                                                    • WSAGetLastError.WSOCK32 ref: 00AA1B94
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorLast$socket
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1881357543-0
                                                                                                                                                                                                                    • Opcode ID: 27471a26cdd631a9f9b5270a1e15200c7f2c233f3c7d5e0951307c658cd947e2
                                                                                                                                                                                                                    • Instruction ID: 8e55e5d6ee6ca265841bfebb000005d1d02485e37e1152959551a258cab21217
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 27471a26cdd631a9f9b5270a1e15200c7f2c233f3c7d5e0951307c658cd947e2
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EA41B034600210AFE720EF24D986F2A77E5AF49718F548458F91A9F7D3D772ED428BA0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: 87dc3880c412e4ecb72849aa466c15fb46383c6c52371238ebb35b81af6fc1d5
                                                                                                                                                                                                                    • Instruction ID: b40b160e2d6c8a4b5247245c0303c2b6ad8c68c8c8eb8741932886735c714cb9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 87dc3880c412e4ecb72849aa466c15fb46383c6c52371238ebb35b81af6fc1d5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3412975A10304BFD7249F38CD41BAABBF9FB88712F20852EF902DB281D371994587A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A95783
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 00A957A9
                                                                                                                                                                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A957CE
                                                                                                                                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A957FA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3321077145-0
                                                                                                                                                                                                                    • Opcode ID: b6c0a7fe958f31e45d462f840d12755aae6ec2bd9b5ac12bb519c5a2a7727656
                                                                                                                                                                                                                    • Instruction ID: bd24e53fc78b50d6409c4dca3eda5d32278fd59138aa7c60d9bdecaf3c7b9123
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b6c0a7fe958f31e45d462f840d12755aae6ec2bd9b5ac12bb519c5a2a7727656
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 01412F35600610DFCF11EF59D545A5EBBE1EF49720B18C498E84A6B362CB30FD01DB91
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00A46D71,00000000,00000000,00A482D9,?,00A482D9,?,00000001,00A46D71,8BE85006,00000001,00A482D9,00A482D9), ref: 00A5D910
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A5D999
                                                                                                                                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00A5D9AB
                                                                                                                                                                                                                    • __freea.LIBCMT ref: 00A5D9B4
                                                                                                                                                                                                                      • Part of subcall function 00A53820: RtlAllocateHeap.NTDLL(00000000,?,00AF1444,?,00A3FDF5,?,?,00A2A976,00000010,00AF1440,00A213FC,?,00A213C6,?,00A21129), ref: 00A53852
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2652629310-0
                                                                                                                                                                                                                    • Opcode ID: 2fe86ef4c16929967105f5f2634b61bd199aae43b8182bb32af62136b55e4297
                                                                                                                                                                                                                    • Instruction ID: 5868a297cc2091d471e546248e8e575af931d60b93489657302e519c997ace1a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2fe86ef4c16929967105f5f2634b61bd199aae43b8182bb32af62136b55e4297
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: AE31B072A0020AEBDF24DF64DC41EAE7BA5EB41311B154268FC04E7161EB35DD59CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00AB5352
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB5375
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00AB5382
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00AB53A8
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3340791633-0
                                                                                                                                                                                                                    • Opcode ID: 1d568df5531822a99214c9185d0b47d252bc8dfcd5a98fde68dca9a68c7311a4
                                                                                                                                                                                                                    • Instruction ID: a7fa67dd5955c6f1700bf9a32b1696168a2216d820985ca7eb3d730169c9d434
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1d568df5531822a99214c9185d0b47d252bc8dfcd5a98fde68dca9a68c7311a4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 9631BE34E55A08EFEB249B64CC65FE837E9AB05390F584102FA119A3E2C7B59981AB41
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00A8ABF1
                                                                                                                                                                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A8AC0D
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A8AC74
                                                                                                                                                                                                                    • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00A8ACC6
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 432972143-0
                                                                                                                                                                                                                    • Opcode ID: 4853492e6c8e9588731241e482152fcc899a47a11c4df8ee4afe78765b5141f0
                                                                                                                                                                                                                    • Instruction ID: 0db59f899334c005df87d25abc3367da592c0165e1cc5d74538370e0c1e0d331
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4853492e6c8e9588731241e482152fcc899a47a11c4df8ee4afe78765b5141f0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E43107B0A407186FFF35EBA98C14BFA7BB5ABA9320F08431BE485921D1D37589858752
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ClientToScreen.USER32(?,?), ref: 00AB769A
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AB7710
                                                                                                                                                                                                                    • PtInRect.USER32(?,?,00AB8B89), ref: 00AB7720
                                                                                                                                                                                                                    • MessageBeep.USER32(00000000), ref: 00AB778C
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1352109105-0
                                                                                                                                                                                                                    • Opcode ID: 8e8e1165b4f4fd5911c3cde454692e8522e427934732690b881af6565b40ed11
                                                                                                                                                                                                                    • Instruction ID: e13cc3465dacb5453834319a7607e283d083cd54dafb484121eabd31b375605c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e8e1165b4f4fd5911c3cde454692e8522e427934732690b881af6565b40ed11
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 25416D34A09214DFCB11CF99C894EED7BF9FB89314F1541A8E4159B262CBB1E982CF90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00AB16EB
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A83A57
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: GetCurrentThreadId.KERNEL32 ref: 00A83A5E
                                                                                                                                                                                                                      • Part of subcall function 00A83A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00A825B3), ref: 00A83A65
                                                                                                                                                                                                                    • GetCaretPos.USER32(?), ref: 00AB16FF
                                                                                                                                                                                                                    • ClientToScreen.USER32(00000000,?), ref: 00AB174C
                                                                                                                                                                                                                    • GetForegroundWindow.USER32 ref: 00AB1752
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2759813231-0
                                                                                                                                                                                                                    • Opcode ID: b95743ceef4f4fed995b094413d3d9d5e3b1ea0a1c0d0ce2bd75c9f8e7b007b0
                                                                                                                                                                                                                    • Instruction ID: b600aa4d928fb1fb67842df35c237fb9a7a99ee982e7f0aeceec4163c0e7638a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b95743ceef4f4fed995b094413d3d9d5e3b1ea0a1c0d0ce2bd75c9f8e7b007b0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 03313E71D00259AFCB04EFA9D981DEEBBFDEF48314B5080A9E415E7212DA319E45CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A27620: _wcslen.LIBCMT ref: 00A27625
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8DFCB
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8DFE2
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A8E00D
                                                                                                                                                                                                                    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00A8E018
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3763101759-0
                                                                                                                                                                                                                    • Opcode ID: 84e68d45c6e3fafb011e0eb8dfd0a68b39784efaa78e54d474e0f7b2ccdf5f19
                                                                                                                                                                                                                    • Instruction ID: 9d82e824101e157f4d653f33f9b8954c7aa5e3007fc6edab1542d994afdd6f73
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 84e68d45c6e3fafb011e0eb8dfd0a68b39784efaa78e54d474e0f7b2ccdf5f19
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D21D175D40214EFCB20EFA8DA81BAEB7F8EF85750F104064F905BB286D6709E41CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB9001
                                                                                                                                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A77711,?,?,?,?,?), ref: 00AB9016
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB905E
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A77711,?,?,?), ref: 00AB9094
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2864067406-0
                                                                                                                                                                                                                    • Opcode ID: 9edbebf9a746b3785a79d700eb5a36d6fe97233fcec7fa8d81aaca8c8f2f403e
                                                                                                                                                                                                                    • Instruction ID: e8dbd83358215bee84f3c62929079be6907b90a36eecce0f9a10d7fa3d501622
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9edbebf9a746b3785a79d700eb5a36d6fe97233fcec7fa8d81aaca8c8f2f403e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 57219F35600018EFCB25DF94C898EFB7FB9EB4A360F044155FA0547262C3719951EBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetFileAttributesW.KERNEL32(?,00ABCB68), ref: 00A8D2FB
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A8D30A
                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A8D319
                                                                                                                                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00ABCB68), ref: 00A8D376
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2267087916-0
                                                                                                                                                                                                                    • Opcode ID: f6a476df6b473a2873307ec36f9cdfb88e2bcf322d8cb1069b6cd54ce103575e
                                                                                                                                                                                                                    • Instruction ID: 1eb5d260eda686a793ef65acc41956e53b240e472cd0b37e13b242caf9d516e8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f6a476df6b473a2873307ec36f9cdfb88e2bcf322d8cb1069b6cd54ce103575e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EF2180705042019FC700EF68D9818AEB7E8FE5A724F104A2DF499DB2E2E7309946CB93
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A81014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A8102A
                                                                                                                                                                                                                      • Part of subcall function 00A81014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A81036
                                                                                                                                                                                                                      • Part of subcall function 00A81014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A81045
                                                                                                                                                                                                                      • Part of subcall function 00A81014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A8104C
                                                                                                                                                                                                                      • Part of subcall function 00A81014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A81062
                                                                                                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A815BE
                                                                                                                                                                                                                    • _memcmp.LIBVCRUNTIME ref: 00A815E1
                                                                                                                                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A81617
                                                                                                                                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00A8161E
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1592001646-0
                                                                                                                                                                                                                    • Opcode ID: bfa539f2109f67cf6fab3afe5a125809453093f620ccd77a64db8cb40b1031ec
                                                                                                                                                                                                                    • Instruction ID: bfe776dfd061b03db5ac09baccd09935acaac9115caf23dcce98490ee07181f3
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: bfa539f2109f67cf6fab3afe5a125809453093f620ccd77a64db8cb40b1031ec
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E3217C71E00109EFDF14EFA4C945BEEB7B8FF84354F184569E481AB251E730AA46CBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00AB280A
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00AB2824
                                                                                                                                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00AB2832
                                                                                                                                                                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00AB2840
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2169480361-0
                                                                                                                                                                                                                    • Opcode ID: b837007d5302820c7fe864cd4c97d9b54a5809b77350a60cedc0f4d51f2244f7
                                                                                                                                                                                                                    • Instruction ID: aac89e9b22dc9bec5f528b4722f72936c55143b48189a73e268393809b86039e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b837007d5302820c7fe864cd4c97d9b54a5809b77350a60cedc0f4d51f2244f7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1421AF31204511AFD714DB68C845FAA7BA9AF85324F148259F4268B6E3CB71FC82CBE0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A88D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00A8790A,?,000000FF,?,00A88754,00000000,?,0000001C,?,?), ref: 00A88D8C
                                                                                                                                                                                                                      • Part of subcall function 00A88D7D: lstrcpyW.KERNEL32(00000000,?,?,00A8790A,?,000000FF,?,00A88754,00000000,?,0000001C,?,?,00000000), ref: 00A88DB2
                                                                                                                                                                                                                      • Part of subcall function 00A88D7D: lstrcmpiW.KERNEL32(00000000,?,00A8790A,?,000000FF,?,00A88754,00000000,?,0000001C,?,?), ref: 00A88DE3
                                                                                                                                                                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00A88754,00000000,?,0000001C,?,?,00000000), ref: 00A87923
                                                                                                                                                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,00A88754,00000000,?,0000001C,?,?,00000000), ref: 00A87949
                                                                                                                                                                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A88754,00000000,?,0000001C,?,?,00000000), ref: 00A87984
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                    • String ID: cdecl
                                                                                                                                                                                                                    • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                    • Opcode ID: 40c4cf918343f10741658202da4539a563023ae413cc55cb61dbe8edc75264ca
                                                                                                                                                                                                                    • Instruction ID: 6034c98a8b01dcdeb8677bd6f9fa18cbe8170bcc11f9d15d14e8fe0328bcfdc1
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 40c4cf918343f10741658202da4539a563023ae413cc55cb61dbe8edc75264ca
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B211E93A200342AFCB15AF39D845D7E77A9FF45390B60412AF946CB265EF31D811C751
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00AB7D0B
                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00AB7D2A
                                                                                                                                                                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00AB7D42
                                                                                                                                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A9B7AD,00000000), ref: 00AB7D6B
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$Long
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 847901565-0
                                                                                                                                                                                                                    • Opcode ID: d37a5361e5c41249eb7ab174af67f811b1261ba3df9b9bfa84efd5a5174745a9
                                                                                                                                                                                                                    • Instruction ID: f28e16195e22f1bd1c88ca5ff3c50e0f93d7aead10dfa62a8ee9f051473d5ecf
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d37a5361e5c41249eb7ab174af67f811b1261ba3df9b9bfa84efd5a5174745a9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 50118E31604615AFCB10DFA8CC44EBA3BA9AF853A0F254724F839D72F2D7719951CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 00AB56BB
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB56CD
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AB56D8
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00AB5816
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend_wcslen
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 455545452-0
                                                                                                                                                                                                                    • Opcode ID: 4b559ae4899aee8f0ea0ab4581b294c8ebe9e72b4d0ffd734c84244da2cc18ba
                                                                                                                                                                                                                    • Instruction ID: dfecea410219bc9003ea5b735ecd12b98feebe80b30037a6e0236b2ef86296ae
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 4b559ae4899aee8f0ea0ab4581b294c8ebe9e72b4d0ffd734c84244da2cc18ba
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: BA11B475E00608AADB20DFB18C85BEE777CEF55764B108526F915D6083EB748981CBA0
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID:
                                                                                                                                                                                                                    • Opcode ID: b6229daa5006290e643eb0d40a24f7be952b8582c7b9967f076e963a25eeb714
                                                                                                                                                                                                                    • Instruction ID: 191ff2ecd70b358ec65c13f151e4ef1231ba64989f0dbf8b37131575ee4ec476
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: b6229daa5006290e643eb0d40a24f7be952b8582c7b9967f076e963a25eeb714
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 19018FB320561A7EF62126B86CC0F77666CFF817BAB300325FD31611E2DB708C484160
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00A81A47
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A81A59
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A81A6F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A81A8A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3850602802-0
                                                                                                                                                                                                                    • Opcode ID: a52b2397a6dc08c9ffacf347ea45d65314898e748892f73ddabb32ef667ab4a0
                                                                                                                                                                                                                    • Instruction ID: f93b3c6398e7be6e5f7e133322d50a4276a7c9ee3632380e137b13d52f916583
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a52b2397a6dc08c9ffacf347ea45d65314898e748892f73ddabb32ef667ab4a0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0B11393AD01219FFEB10EBA4CD85FADFB78EB08750F200091EA10B7290D6716E51DB94
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00A8E1FD
                                                                                                                                                                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00A8E230
                                                                                                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A8E246
                                                                                                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A8E24D
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2880819207-0
                                                                                                                                                                                                                    • Opcode ID: 80676947185fb00fd3c635b4eb1435b45e47f88b9f06b508c2647bb8526d4ade
                                                                                                                                                                                                                    • Instruction ID: 520129debf7c9b739218fbb1040a7c9a3ebbd22caf55c25550e308d457e338e0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 80676947185fb00fd3c635b4eb1435b45e47f88b9f06b508c2647bb8526d4ade
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0811C876904254FBCB01EFE8AC05EEE7FADAB45320F144365F914E72A1E6B0890587A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateThread.KERNEL32(00000000,?,00A4CFF9,00000000,00000004,00000000), ref: 00A4D218
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A4D224
                                                                                                                                                                                                                    • __dosmaperr.LIBCMT ref: 00A4D22B
                                                                                                                                                                                                                    • ResumeThread.KERNEL32(00000000), ref: 00A4D249
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 173952441-0
                                                                                                                                                                                                                    • Opcode ID: 9de5e3e1c55a2f62dc6f6c25f6ca5bed0a16d98abc3bad6b3373232aca92d089
                                                                                                                                                                                                                    • Instruction ID: 2e8f30900390c46c4de0d70d5f0cd1fe7126a4658f2e3cdc22cf420396171b9e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9de5e3e1c55a2f62dc6f6c25f6ca5bed0a16d98abc3bad6b3373232aca92d089
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FD01B93A8052147BDB119BB5DC09BEF7A69EFC1731F204319F925961E1DBB1C905C7A0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00A39BB2
                                                                                                                                                                                                                    • GetClientRect.USER32(?,?), ref: 00AB9F31
                                                                                                                                                                                                                    • GetCursorPos.USER32(?), ref: 00AB9F3B
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB9F46
                                                                                                                                                                                                                    • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00AB9F7A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4127811313-0
                                                                                                                                                                                                                    • Opcode ID: 10044cca9c03d86f8a21b25e070731fed2c39a7a807d04d2f0e211bd20791af7
                                                                                                                                                                                                                    • Instruction ID: 2bcd483048738c777c7cae8a2496638277f820c83b8e3cbfbcb64410a6a90caf
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 10044cca9c03d86f8a21b25e070731fed2c39a7a807d04d2f0e211bd20791af7
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2711063290011AABDB10DFA8D985DFF77BDEB46321F000555FA11E3152D770BA82CBA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A2604C
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000011), ref: 00A26060
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00A2606A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3970641297-0
                                                                                                                                                                                                                    • Opcode ID: 07c4323889e57524b5c80cce69e1a0d21bba68fc0a32bb3a0d33a2dc89876911
                                                                                                                                                                                                                    • Instruction ID: b5c76ad68243d467237166e6aac3d2e0abf981bbf5db29cc90d1883ffee7b8aa
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 07c4323889e57524b5c80cce69e1a0d21bba68fc0a32bb3a0d33a2dc89876911
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: D511A172106518FFEF128FA8AC44EEA7B69FF09365F044211FA0452020D732DC60EBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00A43B56
                                                                                                                                                                                                                      • Part of subcall function 00A43AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00A43AD2
                                                                                                                                                                                                                      • Part of subcall function 00A43AA3: ___AdjustPointer.LIBCMT ref: 00A43AED
                                                                                                                                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00A43B6B
                                                                                                                                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00A43B7C
                                                                                                                                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00A43BA4
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 737400349-0
                                                                                                                                                                                                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                    • Instruction ID: 7b5fc700a509c7c608b5c20ba19aa9706c14d1e22c8a34a99ea0d4907d665a19
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 3701E937100149BBDF126F95CD46EEB7B69EF98754F044114FE4896121C732E961DBA0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00A213C6,00000000,00000000,?,00A5301A,00A213C6,00000000,00000000,00000000,?,00A5328B,00000006,FlsSetValue), ref: 00A530A5
                                                                                                                                                                                                                    • GetLastError.KERNEL32(?,00A5301A,00A213C6,00000000,00000000,00000000,?,00A5328B,00000006,FlsSetValue,00AC2290,FlsSetValue,00000000,00000364,?,00A52E46), ref: 00A530B1
                                                                                                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00A5301A,00A213C6,00000000,00000000,00000000,?,00A5328B,00000006,FlsSetValue,00AC2290,FlsSetValue,00000000), ref: 00A530BF
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3177248105-0
                                                                                                                                                                                                                    • Opcode ID: c81aec4d9cfc43a333631fcc68e277580e8e1b4a45da3b3709d52d9720a3b988
                                                                                                                                                                                                                    • Instruction ID: 9f4cebd686c5e4b5d2c3f5b28eb229f83ea7131622513d79cf30bd824ec0f832
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c81aec4d9cfc43a333631fcc68e277580e8e1b4a45da3b3709d52d9720a3b988
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A201B533301322ABCF218BA8AC44D667798BF857B2B110720FD05E7192C731DD0AC6E0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00A8747F
                                                                                                                                                                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00A87497
                                                                                                                                                                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00A874AC
                                                                                                                                                                                                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00A874CA
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1352324309-0
                                                                                                                                                                                                                    • Opcode ID: 2ca9f298e45d31e57075d4e8188f6560afd136a0e1c21d61c0ff2eae8129c187
                                                                                                                                                                                                                    • Instruction ID: 728497f4ba4801f87b1bee6b689380889c22e2f2c99dfe468d8eb417637a28aa
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 2ca9f298e45d31e57075d4e8188f6560afd136a0e1c21d61c0ff2eae8129c187
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0411C4B52053109FE720EF58DC08F967FFCEB00B10F208569A656D6152D770E904DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A8ACD3,?,00008000), ref: 00A8B0C4
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A8ACD3,?,00008000), ref: 00A8B0E9
                                                                                                                                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00A8ACD3,?,00008000), ref: 00A8B0F3
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00A8ACD3,?,00008000), ref: 00A8B126
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2875609808-0
                                                                                                                                                                                                                    • Opcode ID: 030f1faff70ab34d0cbdbb3b663738463c438a36a0f216fbefec2363f0a764a9
                                                                                                                                                                                                                    • Instruction ID: c0d2a7b23b19f8c34de4535d8e898748c285f3db1149cdba99e2a5b390233e44
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 030f1faff70ab34d0cbdbb3b663738463c438a36a0f216fbefec2363f0a764a9
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7E116D31C1152CE7CF00EFE8E998AEEBF78FF09721F104286D981B6192CB3056518B61
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AB7E33
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB7E4B
                                                                                                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB7E6F
                                                                                                                                                                                                                    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00AB7E8A
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 357397906-0
                                                                                                                                                                                                                    • Opcode ID: 5dab2e58e6801dd2052d3ac228e83f1f3229fef0178720780297ee2ab3ec14ba
                                                                                                                                                                                                                    • Instruction ID: 20c9f421d6837030aabc24b4a950ffe6b061d6fca67f42895409fab1db1f6b05
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5dab2e58e6801dd2052d3ac228e83f1f3229fef0178720780297ee2ab3ec14ba
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 391156B9D0024AAFDB41CF98C8849EEBBF9FF08310F505166E915E3221D775AA55CF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A82DC5
                                                                                                                                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A82DD6
                                                                                                                                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00A82DDD
                                                                                                                                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00A82DE4
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2710830443-0
                                                                                                                                                                                                                    • Opcode ID: ce401c9d4c3db1a079b66b6bb5cb2f4e57846f2c2a6ceace9a15cca1fec97ca5
                                                                                                                                                                                                                    • Instruction ID: b36008e9ddc99dbce5d5c3f0098cdde2fb0aa10b591fcb298ede210049d23aa2
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: ce401c9d4c3db1a079b66b6bb5cb2f4e57846f2c2a6ceace9a15cca1fec97ca5
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B9E0ED725012247BE7206BA69C0DFFB7F6DEB56BB1F401215B505D10A29AA58942C7B0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A39639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00A39693
                                                                                                                                                                                                                      • Part of subcall function 00A39639: SelectObject.GDI32(?,00000000), ref: 00A396A2
                                                                                                                                                                                                                      • Part of subcall function 00A39639: BeginPath.GDI32(?), ref: 00A396B9
                                                                                                                                                                                                                      • Part of subcall function 00A39639: SelectObject.GDI32(?,00000000), ref: 00A396E2
                                                                                                                                                                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00AB8887
                                                                                                                                                                                                                    • LineTo.GDI32(?,?,?), ref: 00AB8894
                                                                                                                                                                                                                    • EndPath.GDI32(?), ref: 00AB88A4
                                                                                                                                                                                                                    • StrokePath.GDI32(?), ref: 00AB88B2
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1539411459-0
                                                                                                                                                                                                                    • Opcode ID: 0b78e9282564224756f7f6c56d4120972eb675897ab23d82360b400d233b475d
                                                                                                                                                                                                                    • Instruction ID: 2ab25a069ef4cf705ef44fd5bbf55d59f7e5a8c505ab81d574a5a0087212f8b0
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0b78e9282564224756f7f6c56d4120972eb675897ab23d82360b400d233b475d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8EF0DA36045259FBDB12AFD8AC0AFDA3A59AF06320F448200FA11650F2C7BA5552DFE5
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetSysColor.USER32(00000008), ref: 00A398CC
                                                                                                                                                                                                                    • SetTextColor.GDI32(?,?), ref: 00A398D6
                                                                                                                                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00A398E9
                                                                                                                                                                                                                    • GetStockObject.GDI32(00000005), ref: 00A398F1
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 4037423528-0
                                                                                                                                                                                                                    • Opcode ID: 9943a037e078873bdd380f6cd7bb7b1b67244e17cb70ab9bfe526043229a89aa
                                                                                                                                                                                                                    • Instruction ID: 91147873ef4b1ba09b271ab1bb14cbbbcc4ffd26745e23189ec4d8949f3a1781
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9943a037e078873bdd380f6cd7bb7b1b67244e17cb70ab9bfe526043229a89aa
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 2CE06D31244280AADB219BB8BC09FED3F20AB12336F04C319F6FA680F2C37146419B20
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetCurrentThread.KERNEL32 ref: 00A81634
                                                                                                                                                                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A811D9), ref: 00A8163B
                                                                                                                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A811D9), ref: 00A81648
                                                                                                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A811D9), ref: 00A8164F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3974789173-0
                                                                                                                                                                                                                    • Opcode ID: 89bb1ecae9382b76b6d7db4ebbe49bd31ceb723cb862f6968613c243e202383a
                                                                                                                                                                                                                    • Instruction ID: f02ce9b2f78037827924520e5b720dc93e6f757a0cf15a46305b27db03514ad7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 89bb1ecae9382b76b6d7db4ebbe49bd31ceb723cb862f6968613c243e202383a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1FE08631601211DBD7207FE09D0DF863B7CBF447A5F184918F285C90A1E6344542C760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00A7D858
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00A7D862
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A7D882
                                                                                                                                                                                                                    • ReleaseDC.USER32(?), ref: 00A7D8A3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2889604237-0
                                                                                                                                                                                                                    • Opcode ID: cc096e4b915ad8e802ef2d20b1b7bcce7f686d97eeae8861d6f75e1bcdf570c0
                                                                                                                                                                                                                    • Instruction ID: 3688e849bf62ec20db126d9620fa36cfbdb19f6ec3804fdfd7dd0a8f46ad675e
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: cc096e4b915ad8e802ef2d20b1b7bcce7f686d97eeae8861d6f75e1bcdf570c0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 7CE01AB4C00204DFCB41EFE4D908E6DBBB1FB48320F109119F806E7261C7384902AF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetDesktopWindow.USER32 ref: 00A7D86C
                                                                                                                                                                                                                    • GetDC.USER32(00000000), ref: 00A7D876
                                                                                                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A7D882
                                                                                                                                                                                                                    • ReleaseDC.USER32(?), ref: 00A7D8A3
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 2889604237-0
                                                                                                                                                                                                                    • Opcode ID: a9b6e2ef4c2ef47990a1308a8faf56fb923558a15bcfe55a0589bee2f3113a41
                                                                                                                                                                                                                    • Instruction ID: 220cfa19d284fd5cb9dda4d341706c0f99628ccec377e56ee81751e8a22bbe7a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a9b6e2ef4c2ef47990a1308a8faf56fb923558a15bcfe55a0589bee2f3113a41
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 27E012B4C00204EFCB40EFE8E908E6DBBB1BB48320F109108F80AE7261CB385902AF50
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A27620: _wcslen.LIBCMT ref: 00A27625
                                                                                                                                                                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00A94ED4
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Connection_wcslen
                                                                                                                                                                                                                    • String ID: *$LPT
                                                                                                                                                                                                                    • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                    • Opcode ID: 470191503432702850949376666412dfd8af8e6dc6e3831fff4d59dd9cc56d3f
                                                                                                                                                                                                                    • Instruction ID: 2f49434d7aa37388dfc232c49c10d8fb997643d96eca562bac0fae066c5c7c27
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 470191503432702850949376666412dfd8af8e6dc6e3831fff4d59dd9cc56d3f
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: B1917F75A002159FCF14DF58C584EAABBF1BF48704F188099E80A9F762D735EE86CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00A4E30D
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ErrorHandling__start
                                                                                                                                                                                                                    • String ID: pow
                                                                                                                                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                    • Opcode ID: fa432627b7ca7f3a810537be0fd26ea7b1bd50cf917f2d7166f1bfc786100280
                                                                                                                                                                                                                    • Instruction ID: bf1384f8db586698ed6eb6eedaee1e0a2aae75eb9d571898f47116dfa10b36dd
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: fa432627b7ca7f3a810537be0fd26ea7b1bd50cf917f2d7166f1bfc786100280
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0517175A0C20296CB16FB14EA027BD3BB4FB80742F304958ECD5562E9DF358C999F86
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID:
                                                                                                                                                                                                                    • String ID: #
                                                                                                                                                                                                                    • API String ID: 0-1885708031
                                                                                                                                                                                                                    • Opcode ID: 06e2cbc251c7b15d579c7c5f3b06bccda971b7966265dadc760466baf056d12b
                                                                                                                                                                                                                    • Instruction ID: 88e2807afa6095a24741ccb515a9bd6a17fe2604007d15c1198687922b410eac
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 06e2cbc251c7b15d579c7c5f3b06bccda971b7966265dadc760466baf056d12b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 89513435600246DFDF19DFA8C881AFA7BA8EF19310F24C0A9F8959B2D0D6349D52CB90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • Sleep.KERNEL32(00000000), ref: 00A3F2A2
                                                                                                                                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A3F2BB
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                    • String ID: @
                                                                                                                                                                                                                    • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                    • Opcode ID: 5aa1564ee176b2b99b3f37a601b95192c22978da14b853520db73066752ed3f4
                                                                                                                                                                                                                    • Instruction ID: 617ce81a258ba942025f7dbdc55f596be80b65c49696db5fa72fa74212977900
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5aa1564ee176b2b99b3f37a601b95192c22978da14b853520db73066752ed3f4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 95512771408744ABD320EF54E986BAFBBF8FB84710F81885DF1D9411A5EB708529CBA6
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00AA57E0
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00AA57EC
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                    • String ID: CALLARGARRAY
                                                                                                                                                                                                                    • API String ID: 157775604-1150593374
                                                                                                                                                                                                                    • Opcode ID: 8be1c049ac490b91041b11812b50e2ef7bf7f88e793d2af4ac66627476db5f76
                                                                                                                                                                                                                    • Instruction ID: 256eeebfd8f89489be7a275bedcd17805e6e3e1e7552f35d8ba6331660101194
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8be1c049ac490b91041b11812b50e2ef7bf7f88e793d2af4ac66627476db5f76
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 8441AE31E002099FCB14DFB8C9819AEBBB5FF5A320F144029F505A7292E7349D81DBA4
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A9D130
                                                                                                                                                                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A9D13A
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                    • String ID: |
                                                                                                                                                                                                                    • API String ID: 596671847-2343686810
                                                                                                                                                                                                                    • Opcode ID: 77a8adcd616577dde29cb80913aca0ea5baa1a6de46e85c291c0d673e2141075
                                                                                                                                                                                                                    • Instruction ID: 74f3eeddcff6d44d9c2c23ceb0ffcfccf9d8ef88b60a8351c7a17b7079b25a7c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 77a8adcd616577dde29cb80913aca0ea5baa1a6de46e85c291c0d673e2141075
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: DA314F71D01219ABCF15EFA8DD85EEE7FB9FF04340F100129F815A6162EB31AA46DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 00AB3621
                                                                                                                                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00AB365C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$DestroyMove
                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                    • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                    • Opcode ID: 8e0d3b0e5333eab80386577b8afc5db3b2c4ce1f93b1edfb0d37973fb0cee4d0
                                                                                                                                                                                                                    • Instruction ID: 9539f21ada584e92257b46b4c803e79519bc85e6d1e409c22de03bac67ea83fc
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 8e0d3b0e5333eab80386577b8afc5db3b2c4ce1f93b1edfb0d37973fb0cee4d0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 81319E72110604AEDB24DF68DC90EFB73ADFF88720F009619F8A5D7291DA30AD81D760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00AB461F
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00AB4634
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                    • String ID: '
                                                                                                                                                                                                                    • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                    • Opcode ID: 1f9ed46d6e1c419fbf808a6b3050709dd2baf08894454206915a9c0d90583321
                                                                                                                                                                                                                    • Instruction ID: f0c22be16afcb71b0b56c1306a272ed9b82012d67577a132512073b4ea55c503
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1f9ed46d6e1c419fbf808a6b3050709dd2baf08894454206915a9c0d90583321
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A3311974A017199FDF14CFA9C990BEA7BB9FF49300F14416AE905AB352E770A941CF90
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00AB327C
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00AB3287
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: MessageSend
                                                                                                                                                                                                                    • String ID: Combobox
                                                                                                                                                                                                                    • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                    • Opcode ID: 953a5ea45a32cd1c1dc26bbafe007e40b8a60529031721d88b6d4cec46f3abf0
                                                                                                                                                                                                                    • Instruction ID: ae9fb6a9a23a9100f2ae767e4153bb6af14e42d0b85c9956cd26450718e795e4
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 953a5ea45a32cd1c1dc26bbafe007e40b8a60529031721d88b6d4cec46f3abf0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: A611B6723001087FEF11DF94DC81EFB376EEB64364F104224F91597292D6759D519760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00A2604C
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: GetStockObject.GDI32(00000011), ref: 00A26060
                                                                                                                                                                                                                      • Part of subcall function 00A2600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00A2606A
                                                                                                                                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00AB377A
                                                                                                                                                                                                                    • GetSysColor.USER32(00000012), ref: 00AB3794
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                    • String ID: static
                                                                                                                                                                                                                    • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                    • Opcode ID: 30eef794c44c4a8825c1a20b52f77252b8ced80c5ea9b33247acd82b9293e418
                                                                                                                                                                                                                    • Instruction ID: 0d7f27d8477481380f312c709f11ecfe4c9bc80895925538788826dbd63a6ca6
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 30eef794c44c4a8825c1a20b52f77252b8ced80c5ea9b33247acd82b9293e418
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 481129B2610209AFDF00DFA8CC45EFA7BB8FB08354F004A24F956E2251EB35E851DB60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A9CD7D
                                                                                                                                                                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A9CDA6
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Internet$OpenOption
                                                                                                                                                                                                                    • String ID: <local>
                                                                                                                                                                                                                    • API String ID: 942729171-4266983199
                                                                                                                                                                                                                    • Opcode ID: edc25956b4f18d0a36abc8d8485cb4263d108892f9e9c97179315eff7ae3e851
                                                                                                                                                                                                                    • Instruction ID: d24020c7e2c3c6fcbf9ba74e1c0ac200031d81680c7cf65dcf3c3bc2ec930aae
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: edc25956b4f18d0a36abc8d8485cb4263d108892f9e9c97179315eff7ae3e851
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EA11C2B1305A31BADB384BA68C49EE7BEECEF127B4F00422AB10983090D7749941D6F0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 00AB34AB
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00AB34BA
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                    • String ID: edit
                                                                                                                                                                                                                    • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                    • Opcode ID: a00771fb9d17b920ad1414cd747aa5eb0515e97f8d2e4cb0dc08b5ada2f7b863
                                                                                                                                                                                                                    • Instruction ID: e5777df312b588f36359ca9615a0d148cca2b9f3e5c448c9bc226e7de89e42f5
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a00771fb9d17b920ad1414cd747aa5eb0515e97f8d2e4cb0dc08b5ada2f7b863
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: FC115872100208AAEF228FA89C84AEA376EEB05775F504724F961931E2C775DC919B60
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 00A86CB6
                                                                                                                                                                                                                    • _wcslen.LIBCMT ref: 00A86CC2
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                    • String ID: STOP
                                                                                                                                                                                                                    • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                    • Opcode ID: 9fc5e7eea344504d640e5093d98b7084b32214b28da58f60a50629089376292e
                                                                                                                                                                                                                    • Instruction ID: 8708b5de7ac037fdd5b6c215149fca5a03cace5bd8431ee559f91c6a55d633d8
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 9fc5e7eea344504d640e5093d98b7084b32214b28da58f60a50629089376292e
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 1101C032A109268BEB21BFFDDD909BF77B6FB65714B100538E86296191EB31D901C750
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A81D4C
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                    • Opcode ID: f80a6af87314dc91f521160fcf1756f10e02afe9479f2904ccba87fa590a14aa
                                                                                                                                                                                                                    • Instruction ID: 3168d739697acd378af162d00c088dc2d9be7c763f74acec70b6f50d77083f9a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: f80a6af87314dc91f521160fcf1756f10e02afe9479f2904ccba87fa590a14aa
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: EE01D875A01228ABCF04FBA4DD51DFF73A8FB46750F040A29F862572D1EA3059098760
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A81C46
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                    • Opcode ID: 6cb097a83631b350401d9a2fa3d666587bde81c39a351fa17ccb7781d3f1ac8d
                                                                                                                                                                                                                    • Instruction ID: 2ca4bf8df07563e43fb5c391261797a8e1ee81905a311d49cc375d8806a3fbc9
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 6cb097a83631b350401d9a2fa3d666587bde81c39a351fa17ccb7781d3f1ac8d
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6201A7F5A811186BCF04FBA4DA61DFF77ACBB15740F140029A40667281EA249E0D87B1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A81CC8
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                    • Opcode ID: 70209b6756b054ed26768a3d0c93feb1403e5ec817f2c85881a53f5e09908215
                                                                                                                                                                                                                    • Instruction ID: 418643d296e581a88650f9da3c3aae86681c615ac027742845a1f1d61237cd31
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 70209b6756b054ed26768a3d0c93feb1403e5ec817f2c85881a53f5e09908215
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5D0186F5A811186BCF14FBA5DB11EFF77ACAB11740F140425B80273281EA659F19C772
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A29CB3: _wcslen.LIBCMT ref: 00A29CBD
                                                                                                                                                                                                                      • Part of subcall function 00A83CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00A83CCA
                                                                                                                                                                                                                    • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00A81DD3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                    • String ID: ComboBox$ListBox
                                                                                                                                                                                                                    • API String ID: 624084870-1403004172
                                                                                                                                                                                                                    • Opcode ID: 5ebbdb0267ef08fe3dc31623219471baa609a83e7287cf930fb159645d835aae
                                                                                                                                                                                                                    • Instruction ID: 7af0d1b7e4f3ef298416e70bf69c3b04f0c5402af2099f0a5201c1f1bed72b4a
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 5ebbdb0267ef08fe3dc31623219471baa609a83e7287cf930fb159645d835aae
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: C9F0A4B1A412286BDB04F7A9DE62FFF77BCBB01750F040D25B822632C1EA6059098361
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: _wcslen
                                                                                                                                                                                                                    • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                    • API String ID: 176396367-3042988571
                                                                                                                                                                                                                    • Opcode ID: 636ee986e246e2a4891424b588fef61ea458335990471de0c3db09ac4d31a29c
                                                                                                                                                                                                                    • Instruction ID: f8c16d5d3c564246a70f5a3412a0536ed2b3b3728657023ca3c94d60dc52c800
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 636ee986e246e2a4891424b588fef61ea458335990471de0c3db09ac4d31a29c
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DE09B16615260219232137A9DC1A7F578DDFCE750714182BF985C32A7EF948D92A3A1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A80B23
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Message
                                                                                                                                                                                                                    • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                    • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                    • Opcode ID: c325395b1e4bfca90e9157c5fabd05b7856b47e790fa24184f5974cb7fade80b
                                                                                                                                                                                                                    • Instruction ID: c4a76dfd22dd8a8e1a12634a8b2fc2450fb21ac2037528609d25c5e7603acb3d
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: c325395b1e4bfca90e9157c5fabd05b7856b47e790fa24184f5974cb7fade80b
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 0FE080322453583BD21437957D07FC97F889F05F75F200426FB58955D38EE1649047E9
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                      • Part of subcall function 00A3F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A40D71,?,?,?,00A2100A), ref: 00A3F7CE
                                                                                                                                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,00A2100A), ref: 00A40D75
                                                                                                                                                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00A2100A), ref: 00A40D84
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A40D7F
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                    • API String ID: 55579361-631824599
                                                                                                                                                                                                                    • Opcode ID: d70aab131cf5bddbad6efaaf00dceabda618e806dce2978399024cd55dbdd044
                                                                                                                                                                                                                    • Instruction ID: 87990bb527afd692ed3dde5cfe5fc2a6a08c257367883fe5fe4c07e0b6608c72
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: d70aab131cf5bddbad6efaaf00dceabda618e806dce2978399024cd55dbdd044
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 4BE06D746003118FD370EFBCE904B927BE4BF04740F044A2DE582C6662EBB5E4499BA1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00A9302F
                                                                                                                                                                                                                    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00A93044
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: Temp$FileNamePath
                                                                                                                                                                                                                    • String ID: aut
                                                                                                                                                                                                                    • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                    • Opcode ID: 87855f65539a24e8bad411f61f71448677f8c9bd550fd75d8eedc8e7c9b48e63
                                                                                                                                                                                                                    • Instruction ID: 354a7d9566a6b84cc778fd1d11736cbdf7ecfc874b9a85fad370bd2a3a2ad649
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 87855f65539a24e8bad411f61f71448677f8c9bd550fd75d8eedc8e7c9b48e63
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 6DD05B7150031477DA20E7D59C0DFC73A6CD704760F0006617755D20A1DAB09545CBD0
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: LocalTime
                                                                                                                                                                                                                    • String ID: %.3d$X64
                                                                                                                                                                                                                    • API String ID: 481472006-1077770165
                                                                                                                                                                                                                    • Opcode ID: 712e945d92be4b267bb3aab978324cbc71cad53216465e85d9296cccdb62b19a
                                                                                                                                                                                                                    • Instruction ID: 04a41656ffa893dc1350f1615e13d0e08ae419613b0e775b7d20c5a82cfed980
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 712e945d92be4b267bb3aab978324cbc71cad53216465e85d9296cccdb62b19a
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: E0D012B1C08109FACB90A6D0DC458FEB37CBF08301F50C452F90AA1042D624C50A67A1
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00AB232C
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00AB233F
                                                                                                                                                                                                                      • Part of subcall function 00A8E97B: Sleep.KERNEL32 ref: 00A8E9F3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 529655941-2988720461
                                                                                                                                                                                                                    • Opcode ID: 1a7866ac377eabb47831284c669faa4c6be4a4cc742052198cfd8ef6b6d5fba4
                                                                                                                                                                                                                    • Instruction ID: 50ecf3a4644126ff76b6954779cbf93ac2c1fc352ec3aed19c0199de1fc8d03c
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 1a7866ac377eabb47831284c669faa4c6be4a4cc742052198cfd8ef6b6d5fba4
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 00D0C9363D4350B6E664F7B19C1FFD6BA14AB14B20F004A16B685AA1E1D9E4A8428A54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00AB236C
                                                                                                                                                                                                                    • PostMessageW.USER32(00000000), ref: 00AB2373
                                                                                                                                                                                                                      • Part of subcall function 00A8E97B: Sleep.KERNEL32 ref: 00A8E9F3
                                                                                                                                                                                                                    Strings
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                    • String ID: Shell_TrayWnd
                                                                                                                                                                                                                    • API String ID: 529655941-2988720461
                                                                                                                                                                                                                    • Opcode ID: 71481cf8158eb5c0e64fc73ef08ee961829ca830a54b2cb85e2fd7d6eb6ee7a0
                                                                                                                                                                                                                    • Instruction ID: bf326b8b706972991ad37171aae0ba55f0c1ea53c8328309142d697580f9b743
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 71481cf8158eb5c0e64fc73ef08ee961829ca830a54b2cb85e2fd7d6eb6ee7a0
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 06D0C9323C1350BAE664F7B19C0FFD6B614AB14B20F004A16B685AA1E1D9E4A8428A54
                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00A5BE93
                                                                                                                                                                                                                    • GetLastError.KERNEL32 ref: 00A5BEA1
                                                                                                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00A5BEFC
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000000.00000002.1730231905.0000000000A21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00A20000, based on PE: true
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730204162.0000000000A20000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000ABC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730337552.0000000000AE2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730443009.0000000000AEC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    • Associated: 00000000.00000002.1730478161.0000000000AF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_0_2_a20000_file.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 1717984340-0
                                                                                                                                                                                                                    • Opcode ID: 0593b630e7d61ce9ae31e4171a12c2b56d65142b268d27d944c0a33d7eecfc39
                                                                                                                                                                                                                    • Instruction ID: 776a7e33e272e397468f7ea6bca16201313367e075fdcbba9453c7db45000ac7
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: 0593b630e7d61ce9ae31e4171a12c2b56d65142b268d27d944c0a33d7eecfc39
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: F641C334610206AFCB21CFA5DD45AAABBA5BF41323F244169FD599B1E1DB30CD09CB70

                                                                                                                                                                                                                    Execution Graph

                                                                                                                                                                                                                    Execution Coverage:0.4%
                                                                                                                                                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                    Signature Coverage:100%
                                                                                                                                                                                                                    Total number of Nodes:6
                                                                                                                                                                                                                    Total number of Limit Nodes:0
                                                                                                                                                                                                                    execution_graph 5005 1947dafa9b2 5006 1947dafaa09 NtQuerySystemInformation 5005->5006 5007 1947daf8d84 5005->5007 5006->5007 5002 1947dad6337 5003 1947dad6347 NtQuerySystemInformation 5002->5003 5004 1947dad62e4 5003->5004

                                                                                                                                                                                                                    Callgraph

                                                                                                                                                                                                                    APIs
                                                                                                                                                                                                                    Memory Dump Source
                                                                                                                                                                                                                    • Source File: 00000010.00000002.2934435496.000001947DAD2000.00000020.00000001.00020000.00000000.sdmp, Offset: 000001947DAD2000, based on PE: false
                                                                                                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                                                                                                    • Snapshot File: hcaresult_16_2_1947dad2000_firefox.jbxd
                                                                                                                                                                                                                    Similarity
                                                                                                                                                                                                                    • API ID: InformationQuerySystem
                                                                                                                                                                                                                    • String ID:
                                                                                                                                                                                                                    • API String ID: 3562636166-0
                                                                                                                                                                                                                    • Opcode ID: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                    • Instruction ID: efb40af354b2bed052bd3b4bb73261e4b8d4642c88ba50583b7185ef26b99d01
                                                                                                                                                                                                                    • Opcode Fuzzy Hash: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                    • Instruction Fuzzy Hash: 5CA3C531624A4C8BDB2DDF68DC95BE973E9FB55300F14432ED98BC3255DB30EA428A81